3 - 4 OCTOBER 2018 / EXCEL LONDON
Register Now
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

Seminars

Here is a list of all confirmed Seminars for 2018. You can add these to your planner by clicking the 'add to schedule' button

All |  Date:
3rd October
4th October 
Select a speaking company
All270
  • Wed 3rd Oct 10:00 - 10:40
  • An Astronaut's Guide To Life On Earth Add to Schedule Chris Hadfield  |     |   Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 10:00 to 10:40

    An Astronaut's Guide To Life On Earth

    In An Astronaut’s Guide to Life on Earth, Colonel Chris Hadfield shows audiences how to “think like an astronaut.” Sharing the useful and practical lessons he’s learned throughout his remarkable career in the fields of leadership, teamwork, collaboration, and science and technology, his vivid and refreshing insights motivate audiences to achieve dreams higher than the clouds, and will change, completely, the way everyone views life on Earth.

    Speaker

    Photo Speaker Name Profile
    Chris Hadfield Chris Hadfield View Profile
  • Wed 3rd Oct 11:00 - 11:30
  • The Network’s next act. Going beyond the previously possible Add to Schedule Chintan Patel  |   Cisco UK and Ireland  |   Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 11:00 to 11:30

    The Network’s next act. Going beyond the previously possible

    With the emergence of AI, IOT and the creation of ever expanding amounts of data, we have reached an inflection point where connection is our universal currency.

    A world with infinite potential to transform business, communities, social movements and the global economy. Yet simultaneously threatened by billions of cyber-attacks every day.

    In this talk hear how this new reality requires a different approach. Where each stage of your business — securing, processing, collaborating, innovating, disrupting — requires a new level of understanding and trust in the infrastructure that powers your ambitions. One where you will need to choose a fundamentally new way forward.

    Speaker

    Photo Speaker Name Profile
    Chintan Patel Chintan Patel View Profile
  • Unbelievable tales of cyber attack Add to Schedule Graham Cluley  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 11:00 to 11:30

    Unbelievable tales of cyber attack

    Every day we read headlines of data breaches, hacks, and malware attacks. Often they're identikit newspaper stories where you could easily just change the names of the companies involved and the number of customer records they have had stolen from them.

    But every now and then something extraordinary happens. Like the companies who pretended to be hacked when they hadn't, or the attackers who went to extraordinary lengths to steal millions from their employers.

    In this presentation, computer security veteran Graham Cluley shares some unbelievable tales of cyber attack.

    Speaker

    Photo Speaker Name Profile
    Graham Cluley Graham Cluley View Profile
  • Customer Journey to Cloud Recovery with AWS and Sungard AS Add to Schedule Phil Laslett  |   Sungard AS   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 11:00 to 11:30

    Customer Journey to Cloud Recovery with AWS and Sungard AS

    Whether already using public or private cloud for your business applications or relying on-premises solutions, back-up and an effective recovery is vital to ensuring ‘business as usual’ operation if disaster does strike.
    There are many options available when it comes to recovery, but one of the most effective can be a cloud based solution - regardless of whether your business is already in the cloud or not.

    This session will evidence why a strong Disaster Recovery strategy is critical more than ever today, customer with examples of businesses that have made the decision to embrace cloud recovery.

    We’ll look at how they came about their decision, the benefits it has brought them, and lessons learn for improving resiliency in your organisation whatever stage you are in your Cloud Journey.

    We’ll also look at the AWS Cloud Platform and how Sungard AS can offer Managed, SLA backed seamless recovery both on-premise to AWS or for businesses already in AWS or other cloud environments.

    Speaker

    Photo Speaker Name Profile
    Phil Laslett Phil Laslett View Profile
  • Digital Transformation positively impacts on the P&L Add to Schedule Angelo Apa  |   Lenovo   |   Modern Storage

    Modern Storage Theatre

    Wed 3rd Oct 11:00 to 11:30

    Digital Transformation positively impacts on the P&L

    As high margin industries are disrupted by new technology a future defined datacentre is required to survive

    Speaker

    Photo Speaker Name Profile
    Angelo Apa Angelo Apa View Profile
  • Citrix SD-WAN – What's new? What’s hot? Add to Schedule Al Taylor  |   cloudDNA   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 11:00 to 11:30

    Citrix SD-WAN – What's new? What’s hot?

    Session freeze, poor quality voice services, random disconnects and long haul networks that slow user productivity. Chances are your branch users think your network sucks and sadly, more often than not, they are right.

    SD-WAN is a super hot industry topic, promising to make all these problems go away but be warned not all SD-WAN solutions are equal.

    Join cloudDNA Co-founder Al Taylor for this fast paced, fact packed lunchtime session to learn what makes a good SD-WAN solution, what features you should look for, what improvements you should expect and who's doing it in the real world.

    Speaker

    Photo Speaker Name Profile
    Al Taylor Al Taylor View Profile
  • Productivity in the Digital Workplace Add to Schedule Bradlee Allen  |   Fuze   |   UC & Collaboration

    UC & Collaboration Theatre

    Wed 3rd Oct 11:00 to 11:30

    Productivity in the Digital Workplace

    With fewer people commuting to a traditional office every day of the week, how should you reevaluate productivity? As we bear witness to a multi-generational workforce consisting of employees that defines productivity differently, the digital workplace must continue to move from being an idea to becoming a reality. In this session, Bradlee will highlight Fuze’s latest research on 6,600 workers around the globe and discuss the opportunities and challenges businesses face when adopting new tools to support an increasingly digital and mobile workforce.

    Speaker

    Photo Speaker Name Profile
    Bradlee Allen Bradlee Allen View Profile
  • Build a Cloud Readiness Lifecycle with Network Intelligence Add to Schedule Alex Henthorn-Iwane  |   ThousandEyes   |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 11:00 to 11:30

    Build a Cloud Readiness Lifecycle with Network Intelligence

    As an IT Ops professional, you rely on many external networks & services you don’t control, including unpredictable Internet transport. Yet you’re still on the hook for the outcome. In this session, we’ll share lessons learned on why & how to move visibility forward into planning, remediate issues pre-deployment, prep ITSM integration and new troubleshooting processes, and continuously adapt to change in the cloud with Network Intelligence.

    Speaker

    Photo Speaker Name Profile
    Alex Henthorn-Iwane Alex Henthorn-Iwane View Profile
  • Preparing for a Hybrid Cloud Future Add to Schedule Liam Eagle  |   451 Research  |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 11:00 to 11:30

    Preparing for a Hybrid Cloud Future

    Businesses are adopting cloud technologies almost universally, and most of them expect a future state in which a combination of on-premises cloud, hosted and public cloud resources are integrated and used in combination to execute business functions. In this session, Liam Eagle, research manager at 451 Research, will outline business trends around hybrid cloud (referencing an enterprise adoption study conducted in association with NTT Communications and Dell EMC), and look at how planning for a hybrid future can and should impact present-day technology decision making.

    Speaker

    Photo Speaker Name Profile
    Liam Eagle Liam Eagle View Profile
  • Awesome Monitoring Infrastructure Using the Elastic Stack Add to Schedule Philipp Krenn   |   Elastic  |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 11:00 to 11:30

    Awesome Monitoring Infrastructure Using the Elastic Stack

    One of the hottest and most widely used tools for log monitoring and analytics at the moment is the Elastic Stack: Elasticsearch doing the hard work of analysing and searching large amounts of data. Logstash for parsing and enrichment. Beats as a lightweight agent or forwarder. Kibana for powerful visualisations. This talk gives you an overview of the four technologies, how they are working together, and how they can solve your problems.

    Speaker

    Photo Speaker Name Profile
    Philipp Krenn Philipp Krenn View Profile
  • DevOps, the database and the role of the DBA Add to Schedule Chris Unwin  |   Redgate   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 11:00 to 11:30

    DevOps, the database and the role of the DBA

    By extending DevOps practices to SQL Server databases, high performing organizations are removing the bottleneck traditionally caused by the database and benefiting from faster delivery, reduced downtime and improved compliance.

    But with companies, like Skyscanner, now releasing database changes 95 times a day, rather than once every six weeks, the demands on database administrators are greater than they have ever been before.

    In this session, we will discuss why the DBA is fundamental to DevOps success and the steps you can take to ensure database deployments can be made as frequently as the business demands, whilst also keeping your data safe.

    Speaker

    Photo Speaker Name Profile
    Chris Unwin Chris Unwin View Profile
  • Security. Made Smarter: Intelligent threat detection and response Add to Schedule Jonathan Zulberg  |   LogRhythm  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 11:00 to 11:30

    Security. Made Smarter: Intelligent threat detection and response

    Your job is to protect your organisation from cyberattacks. To do so, your team must make sense of a plethora of data that is growing exponentially. Resources may be tight, you may be struggling with too many alerts, and you may not be getting the visibility you need with data spread across multiple systems.

    In these circumstances, constantly evolving threats can slip through the cracks. The pressure of missing a damaging breach could be causing you to lose sleep.

    Join LogRhythm to discover how you can reduce your organisation’s risk with a smarter end-to-end approach to cybersecurity that maximises the efficiency and effectiveness of your security operations.

    Learn how:

    • NextGen SIEM enables measurably faster threat detection and response
    • UEBA improves and deepens visibility of user behaviour
    • Automation and orchestration boost efficiency and productivity
    • Threat Lifecycle Management holds the key to effective security operations
    • Machine learning and AI add a new dimension to your security analytics 
    • Cloud analytics provides the scale and intelligence needed for rapid threat detection

    Speaker

    Speaker Name Profile
    Jonathan Zulberg View Profile
  • Can you enable SaaS based Line of Business agility, without compromising IT security? Add to Schedule Daniel Power  |   OneLogin   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 11:00 to 11:30

    Can you enable SaaS based Line of Business agility, without compromising IT security?

    The objective of this session is enable IT to change managers, and employees, perception of being the department that says No, to the department that says Yes, and we will make everyone’s life easier too!
    Focussing on understanding the challenge of Shadow IT, OneLogin will be looking to how to address these challenges at an organisational and technological level.

    Speaker

    Photo Speaker Name Profile
    Daniel Power Daniel Power View Profile
  • How Do Hackers Steal Your Passwords? Add to Schedule Alexandre Cagnoni  |   WatchGuard   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 11:00 to 11:30

    How Do Hackers Steal Your Passwords?

    Join us to learn more about the methods hackers use today to hack into your accounts and steal your passwords- everything from cracking tools to mimikatz. The simplicity of their methods will surprise you.

    Speaker

    Photo Speaker Name Profile
    Alexandre Cagnoni Alexandre Cagnoni View Profile
  • A New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Networks Add to Schedule Max Heinemeyer  |   Darktrace  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 11:00 to 11:30

    A New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. This new wave has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.

    Speaker

    Photo Speaker Name Profile
    Max Heinemeyer Max Heinemeyer View Profile
  • Low and Slow - Data Theft Under the Radar Add to Schedule Matt Lock  |   Varonis UK Ltd  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Matt Lock Matt Lock View Profile
  • Are Smart Cities Failing? ACCESS PLUS Add to Schedule Paul Adams  |   Nokia Software, Europe  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Wed 3rd Oct 11:00 to 11:30

    Speaker

    Photo Speaker Name Profile
    Paul Adams Paul Adams View Profile
  • How to make blockchain work with GDPR and other regulatory compliance requirements ACCESS PLUS Add to Schedule Sreenivas Bandi  |   Finserv Experts  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Wed 3rd Oct 11:00 to 11:30

    How to make blockchain work with GDPR and other regulatory compliance requirements

    Blockchain and GDPR both involve the decentralization of data. Implementing blockchain moves data to decentralized nodes, each owned by an independent party, while GDPR decentralizes the control of data, giving individual people control over how their data is used and monetized. But there is a conflict between the two: Blockchain data is immutable by design, while GDPR mandates that people have the right to be forgotten in certain circumstances. So how do you implement blockchain and other DLT solutions when the data to be stored falls under GDPR? Join Sreeni in an exploration of this issue. This session will discuss the current state of this active debate; it will share some of the most actively supported design ideas, and discuss in detail the current thinking of Lloyd’s, the London Market, and various regulators.

    Speaker

    Photo Speaker Name Profile
    Sreenivas Bandi Sreenivas Bandi View Profile
  • From Bytes to AI: Why it's all about the data lifecycle ACCESS PLUS Add to Schedule Dan Chester  |   Pure Storage   |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 11:00 to 11:30

    From Bytes to AI: Why it's all about the data lifecycle

    Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to tap into their data with artificial intelligence (AI).

    - With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists are tackling new use cases like autonomous driving vehicles and natural language processing.

    Data is the heart of modern deep learning algorithms.

    - Before training can even begin, the hard problem is collecting the labeled data that is crucial for training an accurate AI model. Then, a full scale AI deployment must continuously collect, clean, transform, label, and store larger amounts of data. Adding additional high quality data points directly translates to more accurate models and better insights.

    The goal of this session is to describe and make sense of all of the different ways that data engineers and data scientists ingest, process, and use data in a deep learning system, and then to focus on how a data architect can design the storage infrastructure to power a production AI pipeline.

    Speaker

    Photo Speaker Name Profile
    Dan Chester Dan Chester View Profile
  • PenTesting Problems Add to Schedule Holly Grace Williams  |   Sec-1, a Claranet Group Company  |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 11:00 to 11:50

    Speaker

    Photo Speaker Name Profile
    Holly Grace Williams Holly Grace Williams View Profile
  • Wed 3rd Oct 11:40 - 12:10
  • Hello World: how to be human in the age of the machine Add to Schedule Dr Hannah Fry   |   UCL  |   Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 11:40 to 12:10

    Hello World: how to be human in the age of the machine

    Would you trust an algorithm to send someone to jail? Or to diagnose someone with cancer? How about an algorithm that analysed your friendships to calculate if you were reliable enough to take out a loan? These aren’t hypothetical questions about our distant future. We’re already living in the age of the algorithm. A world where machines rule supreme – making the important decisions in healthcare, transport, finance and security. They’re telling us what to watch, where to go even who to send to prison. So how much should we rely on them to know what’s best? And can we trust them over our own judgement? In this talk, we’ll go on a tour of the good, the bad and the downright ugly of the algorithms that surround us. We’ll lift the lid on their inner workings, demonstrate their power, expose their limitations, and examine whether they really are an improvement on the humans they are replacing.

    Speaker

    Photo Speaker Name Profile
    Dr Hannah Fry Dr Hannah Fry View Profile
  • What Threat Intelligence Teaches Us About Application Security Add to Schedule Ray Pompon  |   F5 Labs  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 11:40 to 12:10

    What Threat Intelligence Teaches Us About Application Security

    Explore in-depth threat intelligence on how web applications are attacked. F5 Labs has spent the past year analyzing and combining data on web attacks from a variety of sources and partners.F5 Labs has looked at a year of data from WhiteHat Security, a 18 months of alerts from tens of thousands of honeypots, a decade of canned attack scripts from ExploitDB, hundreds of public breach records, DDoS attack trends from F5 as well as a global survey of thousands of security professionals. We’ll also explore newly discovered new attacks that could cripple the critical infrastructure of our first responders.

    Speaker

    Photo Speaker Name Profile
    Ray Pompon Ray Pompon View Profile
  • How to Procure a Managed Print Service That Can Help Transition to Digital (While Exceeding Service & Uptime Requirements) Add to Schedule Justin Milligan  |   Xenith Document Systems   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 11:40 to 12:10

    How to Procure a Managed Print Service That Can Help Transition to Digital (While Exceeding Service & Uptime Requirements)

    This seminar describes the important questions to ask when selecting a managed print or managed document service - to ensure that the provider, service and solution you choose is:

    - Aligned to business requirements.
    - Capable of transitioning you to a digital environment.
    - Capable of exceeding your service and device uptime requirements.

    Specifically designed to aid with the procurement of Managed Print or Document Services by companies in the UK with over 200 staff.
    Free workbook provided to anyone that attends, covering the top 21 questions & areas of concern.

    Speaker

    Photo Speaker Name Profile
    Justin Milligan Justin Milligan View Profile
  • From Tape to Cloud in 3 Simple Steps Add to Schedule Kevin Mortimer  |   University of Reading  |   Modern Storage

    Modern Storage Theatre

    Wed 3rd Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Kevin Mortimer Kevin Mortimer View Profile
  • Citrix Workspace - A unified, contextual and secure digital workspace Add to Schedule Nez Bellis  |   Citrix Systems UK Ltd   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 11:40 to 12:10

    Citrix Workspace - A unified, contextual and secure digital workspace

    Managing an ever-increasing list of SaaS, web, and mobile apps running on any number of clouds is unwieldy and increases your security risks. Citrix Workspace, with its people-centric approach to security, enables IT to take control and proactively manage security threats in today’s distributed, hybrid multi-cloud, multi-device environments. Only Citrix can fully aggregate all apps and data across all applications—both on premises and in the cloud—to deliver the right experience to the right user at the right time.

    Speaker

    Photo Speaker Name Profile
    Nez Bellis Nez Bellis View Profile
  • Accelerating Digital Transformation Add to Schedule Curtis Peterson  |   RingCentral   |   UC & Collaboration

    UC & Collaboration Theatre

    Wed 3rd Oct 11:40 to 12:10

    Accelerating Digital Transformation

    xploring the frustrations facing CIOs in the digital transformation space, and the changing mindsets in the sector. Discovering how to pace business evolution to suit the trends of the digital transformation landscape.

    Speaker

    Photo Speaker Name Profile
    Curtis Peterson Curtis Peterson View Profile
  • Get Back to the Future with PRTG Add to Schedule Martin Hodgson  |   PAESSLER AG - PRTG Network Monitor  |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 11:40 to 12:10

    Get Back to the Future with PRTG

    Join the team from PAESSLER for this compelling presentation, showing you how PRTG our unified monitoring platform can be used to monitor all generations of computing.

    Speaker

    Photo Speaker Name Profile
    Martin Hodgson Martin Hodgson View Profile
  • What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough Add to Schedule Alexandra Gates  |   Aerohive Networks   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 11:40 to 12:10

    What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough

    Optimizing user mobile experience requires more than just high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like OFDMA. This session covers 802.11ac and 802.11ax, data analytics, and building robust wireless networks.

    Speaker

    Photo Speaker Name Profile
    Alexandra Gates Alexandra Gates View Profile
  • Lessons from Deploying Digital Assistants and Chatbots Add to Schedule Ian Wallis  |   Oracle   |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Ian Wallis Ian Wallis View Profile
  • Continuous Delivery for Infrastructure as Code and the Changing Role of IT Ops Add to Schedule Alberta Bosco  |   Puppet   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 11:40 to 12:10

    Continuous Delivery for Infrastructure as Code and the Changing Role of IT Ops

    Infrastructure as code helped to bridge the gap between Ops and Dev, enabling Ops teams to share the same agile development best practices that Dev teams have used for years. As a result, the role of IT Ops has also shifted from being mostly about managing systems to actually programmatically automating systems. As DevOps has matured and gained traction, we’ve seen more Ops teams also adopting continuous delivery practices to test and deploy their infrastructure as code. We see continuous delivery for Infrastructure as Code as the next stage of evolution for Ops teams as their roles continue to shift.

    Speaker

    Photo Speaker Name Profile
    Alberta Bosco Alberta Bosco View Profile
  • Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop Add to Schedule Jamie Sarakinis  |   Securonix   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 11:40 to 12:10

    Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop

    We live in a digital world where the volume, variety, and velocity of data continue to grow exponentially. Collecting and analyzing this data for actionable threats is an enormous challenge. Legacy SIEM tools designed 10+ years ago are not architected to scale to handle this massive volume of data, and the rule-based approach used by these SIEMS is not sufficient to detect advanced modern cyber threats.

    Join Securonix to learn about the next-gen approach to security monitoring. The Hadoop platform enables unlimited scale, and machine learning-based analytics enables you to find the needle in the haystack of threats with minimal human intervention.

    Speaker

    Photo Speaker Name Profile
    Jamie Sarakinis Jamie Sarakinis View Profile
  • The future of authentication. Secure passwordless login for employees and customers Add to Schedule Claire Galbois-Alcaix  |   Yubico   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 11:40 to 12:10

    The future of authentication. Secure passwordless login for employees and customers

    Interested in learning more about how you could transform your users experience and reduce IT support costs with secure passwordless authentication?

    Unlike early predecessors, newly-developed open authentication standards, such as FIDO U2F and FIDO 2, provide strong authentication and high privacy with characteristics that have eluded previous hardware tokens – elegance and simplicity. Impossible you think?

    This session will change your perceptions and eventually protect your online accounts.

    Speaker

    Photo Speaker Name Profile
    Claire Galbois-Alcaix Claire Galbois-Alcaix View Profile
  • Revenge of the Nerds. Using Data Science to defeat the cybercriminals Add to Schedule John Shaw  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 11:40 to 12:10

    Revenge of the Nerds. Using Data Science to defeat the cybercriminals

    John Shaw will describe how Sophos’s data scientists are using machine learning, neural networks and other data science techniques to stop new and unknown malicious activity in business networks. He will describe the techniques that are already proving very effective, and where the next breakthroughs are likely to come from.

    Speaker

    Photo Speaker Name Profile
    John Shaw John Shaw View Profile
  • Securing Serverless - The future of Cybersecurity Add to Schedule Joseph Pindar  |   Gemalto  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Joseph Pindar Joseph Pindar View Profile
  • Stepping into the cloud with confidence Add to Schedule Paul D’Cruz  |   Cisco Systems  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 11:40 to 12:10

    Stepping into the cloud with confidence

    It’s no surprise that organizations are increasingly investing in the cloud for its key capabilities—ease of use, scalability, and cost savings. The cloud is changing the way we work. This also introduces new security risks. You can roll the dice and hope that someone else is keeping an eye on security. Or, you can ensure your security in the cloud with Cisco Stepping into the cloud with confidence solutions. In this session, you will see how things are changing, what the new risks are, and how you can protect yourself and your company as you take advantage of the many benefits of using the cloud.

    Speaker

    Photo Speaker Name Profile
    Paul D’Cruz Paul D’Cruz View Profile
  • The AI Mindset - Bridging Industry and Academic Perspectives ACCESS PLUS Add to Schedule Dr Greg Benson  |   SnapLogic  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 11:40 to 12:10

    The AI Mindset - Bridging Industry and Academic Perspectives

    All industries will be leveraging AI and ML technology going forward. While ML is ultimately codified in software, the process needed to reach a working ML solution is very different from normal software development. As a Professor and Ph.D. Greg comes from an academic background but has bridged academic and industry as Chief Scientist at SnapLogic. In this talk, he describes how he brought ML into the SnapLogic platform and how to combine the strengths of industry practices and academic methodologies to achieve success with ML.

    Speaker

    Photo Speaker Name Profile
    Dr Greg Benson Dr Greg Benson View Profile
  • The Perfect Storm: How wireless mini-sensors and simple, scalable IoT are changing everything ACCESS PLUS Add to Schedule Tarjei Vassbotn  |   Disruptive Technologies  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Wed 3rd Oct 11:40 to 12:10

    The Perfect Storm: How wireless mini-sensors and simple, scalable IoT are changing everything

    IoT holds great promise; over 40% of global CIOs believe that IoT will disrupt their business models within five years. And it will… Now with wireless mini-sensors the size of a keyboard key and with ultra-long battery life, organizations have access to an unprecedented amount of data to optimize their operations and reduce costs.

    Tarjei Vassbotn reveals the recent breakthroughs in IoT you need to know for a successful IoT program. He’ll also share use cases for key industries from real estate and manufacturing to energy and healthcare.

    Speaker

    Photo Speaker Name Profile
    Tarjei Vassbotn Tarjei Vassbotn View Profile
  • Wed 3rd Oct 12:00 - 12:50
  • Incident and Breach Management: Building a Harmonized Response Plan for Privacy & Security Teams Add to Schedule Ian Evans  |   OneTrust   |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 12:00 to 12:50

    Incident and Breach Management: Building a Harmonized Response Plan for Privacy & Security Teams

    In the event of a breach, security and privacy professionals often approach response from two different outlooks. While security teams are focused on threat vectors, privacy teams concerned with personal data leaks and adhering to various global privacy laws. While the two approach breaches from different perspectives, it is possible to build an incident and breach response plan that addresses the needs of both teams. In this session, we’ll discuss how to build a harmonized response plan that addresses both the security team’s technical needs and privacy team’s regulatory requirements across the patchwork of US privacy laws, the GDPR and other global privacy regulations. We’ll also provide tips to help you map out a 72-hour personal data breach action plan.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Wed 3rd Oct 12:20 - 12:50
  • The New Mafia: cyber gangs, vigilantes and what it means for businesses Add to Schedule Helge Husemann  |   Malwarebytes   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 12:20 to 12:50

    The New Mafia: cyber gangs, vigilantes and what it means for businesses

    Cybercriminals are the New Mafia of today’s world. Though care is taken to shroud their operations, their sophistication, execution, and malice are aligned with those historically practised by criminal organisations.

    Recent research underscored that one in 13 UK cyber professionals are perceived by their peers to be grey hats – New Mafia representatives ‘on the inside’. Companies find themselves fighting the good fight on multiple fronts.

    We must change the cybercrime narrative in order to shine a light into the darkest corners of the New Mafia's operations and show them for what they really are – miscreants. The fight back, he will argue, must begin today.

    Speaker

    Photo Speaker Name Profile
    Helge Husemann Helge Husemann View Profile
  • Unleashing the Potential of Cloud Object Storage for File Storage Add to Schedule Andres Rodriguez  |   Nasuni   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 12:20 to 12:50

    Unleashing the Potential of Cloud Object Storage for File Storage

    What do Azure, AWS, Dell EMC, Hitachi, and IBM clouds have in common? All are leveraging the UniFS® global file system from Nasuni to make their object storage ready for file storage. Learn how the combination eliminates the need for traditional NAS, file server, backup, archive, and DR infrastructure. How you can now scale file storage without the limits of legacy device-based file systems. And how you can get easier to manage and more resilient NAS that costs up to 70% less.

    Speaker

    Photo Speaker Name Profile
    Andres Rodriguez Andres Rodriguez View Profile
  • The Nutanix enterprise cloud platform Add to Schedule Matt Nichols   |   Nutanix   |   Modern Storage

    Modern Storage Theatre

    Wed 3rd Oct 12:20 to 12:50

    The Nutanix enterprise cloud platform

    Join Matt Nichols as he takes you through the journey of discovery around the Nutanix Cloud platform and where it can transform your organisation. Hear about the latest developments with recent acquisitions. Such as Flow, offering SDN and Network Micro-segmentation, Beam for Cloud Management and Compliance and many others.

    Speaker

    Photo Speaker Name Profile
    Matt Nichols Matt Nichols View Profile
  • 8x8 Live case study with Global BPO Add to Schedule David Chase  |   8x8  |   UC & Collaboration

    UC & Collaboration Theatre

    Wed 3rd Oct 12:20 to 12:50

    8x8 Live case study with Global BPO

    Learn how one of the biggest business process outsources examined the market, chose and implemented 8x8. The importance of choosing the right supplier when providing technical support services to industry leading blue chip companies.

    Speaker

    Photo Speaker Name Profile
    David Chase David Chase View Profile
  • DNA Wireless Assurance: Isolate problems for faster troubleshooting Add to Schedule Jason Tyler  |   Cisco  |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 12:20 to 12:50

    DNA Wireless Assurance: Isolate problems for faster troubleshooting

    There's no such thing as a typical day for a wireless network engineer. That's because operating enterprise wireless networks is not only about providing connectivity and RF coverage, it's also about getting to the root cause of complex configurations, symptoms, and seemingly random client drop outs from users that have countless persona - multiple device types, operating system and driver versions, and application requirements that were never designed to be wireless centric.

    In this session learn how Cisco DNA Center Assurance with Real Time Wifi Analytics provides a way to deliver real-time wireless anomaly detection, automated network forensics, and enhanced root cause analysis capabilities so that administrators can troubleshoot and resolve wireless issues faster and more easily than ever before.

    Speaker

    Photo Speaker Name Profile
    Jason Tyler Jason Tyler View Profile
  • Is SD-WAN overhyped? What you need to know when deciding if it is right for you. Add to Schedule Alex Ayers  |   Gamma   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 12:20 to 12:50

    Is SD-WAN overhyped? What you need to know when deciding if it is right for you.

    The need for high capacity, flexible bandwidth to power businesses has never been greater. Driven by the increasing use of sophisticated applications, cloud adoption and desires to improve CX, businesses are looking to advanced WAN services to help compete in today’s digitally disrupted markets.

    This session will encourage you to challenge your use-case for SD-WAN beyond vendor hype and when considering your next evolution in WAN requirements to ask the right questions on ROI.

    Speaker

    Photo Speaker Name Profile
    Alex Ayers Alex Ayers View Profile
  • OpenSource The DevOps Enabler Add to Schedule James Allen  |   Red Hat   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 12:20 to 12:50

    OpenSource The DevOps Enabler

    With the current pressure on IT to provide faster and more agile platforms for business Red Hat will show why those adopting OpenSource tooling and practice are succeeding at the expense of those who don't.

    Speaker

    Photo Speaker Name Profile
    James Allen James Allen View Profile
  • Is there a future for SIEM? Add to Schedule Oli Pinson-Roxburgh  |   Bulletproof  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 12:20 to 12:50

    Is there a future for SIEM?

    Global SIEM expert Oli Pinson-Roxburgh considers the future of SIEM technology platforms and explores how SIEM as we know it can fit into a world of fast-changing technology and ever-evolving threat landscapes. Can it survive, and if so, what might it look like? More importantly, could it still keep your organisation secure?

    Speaker

    Photo Speaker Name Profile
    Oli Pinson-Roxburgh Oli Pinson-Roxburgh View Profile
  • PAM: The critical missing piece in your security strategy Add to Schedule Scott Walker  |   Bomgar   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 12:20 to 12:50

    PAM: The critical missing piece in your security strategy

    Gartner stated this year that if you can only tackle one project to improve the security of your enterprise it should be Privileged Access Management (PAM).

    This session will discuss what ‘privilege’ means to your business and how implementing a PAM solution drives significant improvements across the organisation. It will cover:

    Why organisations should make PAM their top 2019 investment

    Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success

    Tools to prepare your business case for your PAM project and to get your executive leadership buy in

    Speaker

    Photo Speaker Name Profile
    Scott Walker Scott Walker View Profile
  • HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks Add to Schedule Zeki Turedi   |   CrowdStrike   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 12:20 to 12:50

    HACKING EXPOSED: Stories from the battlefield: lessons learnt in responding to the most advanced cyber attacks

    CrowdStrike continues to expose unprecedented efforts by highly sophisticated adversaries targeting -- and in some cases, selectively leaking -- information stolen from sensitive government, corporate and private networks. These intrusions reflect a broad range of motives and targets, revealing many never-before-seen tactics, techniques and procedures (TTPs) that are advancing the art of data manipulation and attack obfuscation, while raising the bar significantly for organizations seeking to protect themselves from these potentially disruptive and destructive attacks.

    This session will shed light on alarming new trends CrowdStrike has observed in the global cyber threat landscape, and the evolving best practices that are proving most successful against criminal, hacktivist and nation-state adversaries.

    Speaker

    Photo Speaker Name Profile
    Zeki Turedi Zeki Turedi View Profile
  • Data and email security: The challenges of integration Add to Schedule Rob Reid   |   StayPrivate   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 12:20 to 12:50

  • Automated Security in a Multi Cloud World Add to Schedule Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 12:20 to 12:50

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speakers

    Photo Speaker Name Profile
    Keiron Shepherd Keiron Shepherd View Profile
    Matthew Prickett Matthew Prickett View Profile
  • Bias in AI is more dangerous than killer robots ACCESS PLUS Add to Schedule Charlotte Han  |   NVIDIA Corporation  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 12:20 to 12:50

    Bias in AI is more dangerous than killer robots

    We are increasingly trusting algorithms to make decisions: from finding the optimal driving route to hiring the best talents, automated decision-making is supposed to optimize our lives. The potential for AI to improve our lives and boost economy is huge, but algorithms built by humans and datasets selected may be laced with human cognitive bias. In this talk, we will explore how data and algorithms could go wrong, and the possible solutions to rid biases. It's not general AI we should worry about now - bias in AI is already impacting our lives and is a more pressing issue.

    Speaker

    Photo Speaker Name Profile
    Charlotte Han Charlotte Han View Profile
  • MQTT for IoT, the Fundamentals ACCESS PLUS Add to Schedule Michael Karliner   |   ThingStudio  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Wed 3rd Oct 12:20 to 12:50

    MQTT for IoT, the Fundamentals

    MQTT is a lightweight messaging protocol designed especially for IoT. Originally created by IBM, it is now an international standard and widely used through industry. In this session you will learn the basics of MQTT and how to decide when it is appropriate for your use case.

    Speaker

    Photo Speaker Name Profile
    Michael Karliner Michael Karliner View Profile
  • Taking Blockchain from Catchphrase to Actual Business Benefit ACCESS PLUS Add to Schedule Carrie Osman  |   Cruxy & Company  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Wed 3rd Oct 12:20 to 12:50

    Taking Blockchain from Catchphrase to Actual Business Benefit

    Having operated as a strategic advisor to one of the largest blockchain companies in the world, Carrie Osman will be taking a long and brutal look at what is holding blockchain back. What is the true value of blockchain and distributed ledger technology? Why does it currently seem like it’s all talk and no action? Why are we not seeing more genuine use cases being developed? Are we even exploring the correct types of use cases? This will be a session full of punch, rigour and honest questioning and is not to be missed.

    Speaker

    Photo Speaker Name Profile
    Carrie Osman Carrie Osman View Profile
  • Secure End-Point Management in a Software-Defined World! Add to Schedule Doug Brown  |   IGEL Technology   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 12:20 to 13:05

    Secure End-Point Management in a Software-Defined World!

    In this session, IGEL’s Douglas Brown will discuss the state of end-user computing and how a software-defined approach to end-point management positions IT for the future, plus much more.
    In this session, you will learn:
    - VDI / SBC in the Enterprise Today
    - VDI is today, DaaS is tomorrow. Solutions like AWS, Azure, Google are effecting the requirement and rules of the end-point.
    - What Software-Defined means to EUC, End-points and End-point management.
    - IGELs solutions to help solve the changing world (UD Pocket, IGEL OS, ICG, and UMS).
    - The Future of IGEL and how that maps to the future of the Enterprise.

    This will be a very lively session, come one and come all to learn, have a few laughs, and walk away with one foot in to the future of EUC and IT!

    Speaker

    Photo Speaker Name Profile
    Doug Brown Doug Brown View Profile
  • PANEL: IP EXPO Bytesize: New Trends - Edge Computing, Cloud Interconnectivity, Blockchain & SD-WAN Add to Schedule Panel  |  Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 12:20 to 13:10

    PANEL: IP EXPO Bytesize: New Trends - Edge Computing, Cloud Interconnectivity, Blockchain & SD-WAN

    The IP EXPO Bytesize panels are designed to give attendees an executive overview of the latest trends in IT. Four panellists, each a leading expert in their respective field, will each share a bite sized overview of a given topic during one education packed session. The sessions are designed to be interactive so attendees plus our social followers will have the opportunity to ask their questions to the panel in an extended Q&A.

    Speakers:

    Edge Computing - Richard Bennett, VMware

    Cloud Interconnectivity - Michael Winterson, Equnix

    Blockchain - Carrie Osman, Cruxy & Company

    SD-WAN - Al Taylor, CloudDNA

    Speakers

    Photo Speaker Name Profile
    Al Taylor Al Taylor View Profile
    Carrie Osman Carrie Osman View Profile
    Michael Winterson Michael Winterson View Profile
    Richard Bennett Richard Bennett View Profile
  • Deploying an Application Stack using AWS Fargate: Live Demo Add to Schedule Ric Harvey   |   Amazon Web Services   |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 12:20 to 13:10

    Deploying an Application Stack using AWS Fargate: Live Demo

    A live demo deploying containers at scale with zero infrastructure overhead. In this session you’ll see a websocket.io application deployed to the cloud using Amazon Web Services and Docker Containers and Fargate. You’ll see how simple it is to go from concept to production in a few steps.

    Speaker

    Photo Speaker Name Profile
    Ric Harvey Ric Harvey View Profile
  • Wed 3rd Oct 13:00 - 13:30
  • From Cohesity: Remaking Secondary Storage - tackling the sprawl and complexity of modern IT. Add to Schedule Stuart Gilks  |   Cohesity   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 13:00 to 13:30

    From Cohesity: Remaking Secondary Storage - tackling the sprawl and complexity of modern IT.

    With secondary data comprising 80% of storage, a modern approach is needed to combat sprawl, dark data, reduce costs & complexity whilst enabling IT to deliver on flexiblity and business needs.
    Join this session to hear how companies are embracing Cohesity hyperconverged secondary storage for flexible, simple & cloud integrated infrastructure to support data protection, analytics and tier 2 NAS and VM workloads.

    Speaker

    Photo Speaker Name Profile
    Stuart Gilks Stuart Gilks View Profile
  • How to Recover from a Ransomware Infection; LIVE! Powered by Liquid Nitrogen! Add to Schedule Phil McGowan  |   Datto   |   Modern Storage

    Modern Storage Theatre

    Wed 3rd Oct 13:00 to 13:30

    How to Recover from a Ransomware Infection; LIVE! Powered by Liquid Nitrogen!

    Are you sick and tired of liquid nitrogen freezing your servers and plunging your business into downtime? Do sub-zero temperatures destroy your data, cool your customers and put a crack in your profits?! Yep, we thought so. Come along to our session and see how we recover a ransomware-infected, frozen server in a matter of seconds! It’s enough to give anyone the goosebumps! Our platform is built specifically for MSPs and we have the answers you need! Wrap up warm: this is a demo you won’t want to miss!

    Speaker

    Speaker Name Profile
    Phil McGowan View Profile
  • The rise of IT Operations – AI and predictive analytics Add to Schedule Aaron Aldrich  |   Navisite   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 13:00 to 13:30

    Speaker

    Photo Speaker Name Profile
    Aaron Aldrich Aaron Aldrich View Profile
  • Scaling DevOps Transformation at Lloyds Bank Add to Schedule Tech Leaders  |  DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 13:00 to 13:30

    Scaling DevOps Transformation at Lloyds Bank

    Mark and James will give a “from-the-trenches” view of the DevOps Transformation journey at Lloyds Banking Group, covering the technical and cultural challenges along the way, as well as focusing on how they’re tackling the problem of scaling the transformation in a traditional enterprise environment.

    Speakers

    Photo Speaker Name Profile
    James Betteley James Betteley View Profile
    Mark Howell Mark Howell View Profile
  • Hacking a smart CCTV Camera Add to Schedule Scott Helme  |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 13:00 to 13:30

    Hacking a smart CCTV Camera

    Scott and his team recently hacked a very popular smart camera. Targeted at homes and small businesses they could view the live, HD feed from anywhere in the world. It turned out that anyone else could too…

    Speaker

    Photo Speaker Name Profile
    Scott Helme Scott Helme View Profile
  • Securing email – so much more than just encryption Add to Schedule Neil Larkins  |   Egress   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 13:00 to 13:30

    Securing email – so much more than just encryption

    Email is far from dead. It is estimated that over 281 billion emails are sent globally every day, cementing it as one of the primary mechanisms for business communication. However, when relied upon by staff to share personal data, email also becomes a major cause of data breaches.

    Join Egress’ Neil Larkins as he examines the ways email security technology can adapt to tackle security threats in a time when organisations are under more legislative pressure than ever before, including the evolution of encryption, preventing user error and risk-based authentication.

    Speaker

    Photo Speaker Name Profile
    Neil Larkins Neil Larkins View Profile
  • Review of Advanced Persistent Threat Activities in 2018 Add to Schedule David Emm  |   Kaspersky Lab   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 13:00 to 13:30

    Review of Advanced Persistent Threat Activities in 2018

    Targeted attacks are now an established part of the threat landscape and the headlines were full of news about sophisticated attacks of all kinds. It's clear that organisations of all kinds need to understand and prepare for cyber-threats affecting their sector. And this must start with an understanding of the current threat landscape and how it's likely to develop.

    David Emm will chart the latest campaigns, tools and techniques deployed by established threat actors and the trends that we are seeing.

    Speaker

    Photo Speaker Name Profile
    David Emm David Emm View Profile
  • Ensuring Least Privilege – A highly practical guide Add to Schedule Tim Carolan   |   Thycotic   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 13:00 to 13:30

    Ensuring Least Privilege – A highly practical guide

    With an environment featuring ever present regulatory and compliance risk, it can be difficult to know where to begin with a least privilege security strategy. During this very practical presentation, Tim will take you through a number of tools and techniques that you can implement in order to quickly cut down your excess privilege exposure and take back full control of your most precious and important privileged accounts.

    Speaker

    Photo Speaker Name Profile
    Tim Carolan Tim Carolan View Profile
  • The Intersection of LTE & SD-WAN; LTE’s Role as a Primary WAN Link Add to Schedule Donna Johnson  |   Cradlepoint   |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 13:00 to 13:30

    The Intersection of LTE & SD-WAN; LTE’s Role as a Primary WAN Link

    Software-Defined WANs are no longer just for large buildings with loads of traffic headed to the data centre. The expansion of enterprise-grade LTE networks, the upcoming availability of Gigabit LTE, and some carriers' support for unmetered data plans are making wireless viable as a primary WAN link and ideal for accessing Internet and SaaS content directly from the branch. Also, the flexibility provided by wireless is critical for today's enterprises that are pushing the boundaries of the branch out of the bricks and mortar locations to bring products and services directly to the customers they service. 

    In this session, Cradlepoint’s VP of Product and Solution Marketing, Donna Johnson, will explore how the combination of wireless connectivity and SD-WAN is ideal for bringing reliability and security to today's increasingly mobile workforce and ever-expanding network’s edge — and for providing connectivity to applications and data in the Cloud.

    Key topics in the session will include: The needs and challenges at the network’s edge, why LTE is ready to be a primary WAN link for many types of organisations, how SD-WAN has expanded beyond the branch into in-vehicle environments, the importance of Cloud-delivered visibility and control for wireless WAN.

    Speaker

    Photo Speaker Name Profile
    Donna Johnson Donna Johnson View Profile
  • Why Hack When You Can Phish? Add to Schedule Richard Bettney  |   KnowBe4  |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 13:00 to 13:50

    Speaker

    Speaker Name Profile
    Richard Bettney View Profile
  • Wed 3rd Oct 13:40 - 14:10
  • It’s the End of the World and I Feel Fine – Artificial Intelligence, Apocalypticism, and Human Identity Add to Schedule Dr Beth Singler   |   University of Cambridge  |   Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 13:40 to 14:10

    It’s the End of the World and I Feel Fine – Artificial Intelligence, Apocalypticism, and Human Identity

    Anthropologist Dr Beth Singler will introduce some of the key narratives round artificial intelligence that are affecting the public conception of the technology and its development. She will address the impact of science fiction as well as science fact on hopes and fears for humanity’s future in a world of ‘nearly human’ machines. Drawing on anthropological fieldwork at tech conferences, transhumanist gatherings, among the existential risk eco-system, and among online communities, she will explore how public perception on Artificial Intelligence is shaped and what those shapings might mean for the future of this technology.

    Speaker

    Photo Speaker Name Profile
    Dr Beth Singler Dr Beth Singler View Profile
  • Digital Transformation: Cure-all, Placebo or Poison Pill Add to Schedule Patrick Grillo  |   Fortinet   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 13:40 to 14:10

    Digital Transformation: Cure-all, Placebo or Poison Pill

    Are you really ready for Digital Transformation?  While the business benefits are clear, technology adoption, the escalating threat landscape and compliance to any number of standards and legal requirements are all challenges to any DX efforts. If your organization is moving into the Digital future, you need to make sure that your security infrastructure isn’t stuck in the past. This session will provide the insight towards a comprehensive and adaptive security architecture that can support your organization’s changing objectives and more importantly, evolve as the cyber threat challenge evolves as well.

    Speaker

    Photo Speaker Name Profile
    Patrick Grillo Patrick Grillo View Profile
  • Azure Migration – Clearing the last minute hurdles Add to Schedule Dave Williams  |   Ed Broking  |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 13:40 to 14:10

    Azure Migration – Clearing the last minute hurdles

    Despite the apparent maturity of cloud platforms, the migration process is often not fully understood. The simplicity of the provided migration tools means that anyone can migrate their data and workloads to a hosted platform like Azure – but not everyone can do it well.

    We took the strategic decision to move to the Azure cloud because of its future-proofing potential. In the end we were able to migrate more than 120 virtual servers and 50Tb of data in just six weeks. Join my presentation to find out what were the crucial factors of this journey.

    Speaker

    Photo Speaker Name Profile
    Dave Williams Dave Williams View Profile
  • Solving the Azure Storage Maze Add to Schedule Aidan Finn  |   Cloud Mechanix  |   Modern Storage

    Modern Storage Theatre

    Wed 3rd Oct 13:40 to 14:10

    Solving the Azure Storage Maze

    Azure storage offers a huge quantity of options. Understanding what you should use, when you should use it, and how much it will cost is confusing, even for those who are Azure veterans. This session will offer a map to Azure storage. You will learn what each offering is and when it works best.

    Speaker

    Photo Speaker Name Profile
    Aidan Finn Aidan Finn View Profile
  • Why Lewisham & Greenwich NHS Trust chose to deploy Citrix virtual workspaces on Microsoft Azure as part of its modern workspace strategy. Add to Schedule Tech Leaders  |  App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 13:40 to 14:10

    Why Lewisham & Greenwich NHS Trust chose to deploy Citrix virtual workspaces on Microsoft Azure as part of its modern workspace strategy.

    The session address why Lewisham & Greenwich NHS Trust opted for a cloud-first approach to deliver its unified workspace to its community service in south-east London. The presentation will outline the process from business case development to delivery. Focusing on the challenges, frustrations and opportunities of this approach along with the reasoning behind the critical decisions, choices and constraints.

    Speakers

    Photo Speaker Name Profile
    Justin Beardsmore Justin Beardsmore View Profile
    Paul Kiveal Paul Kiveal View Profile
  • Achieving Voice Quality in The Cloud Add to Schedule Harry Bowlby  |   Spitfire Network Services   |   UC & Collaboration

    UC & Collaboration Theatre

    Wed 3rd Oct 13:40 to 14:10

    Achieving Voice Quality in The Cloud

    The Cloud offers a seemingly ideal environment for delivering voice and unified communication solutions. However a Cloud service is only as good as the connection to it. This session looks at the pitfalls of deploying a PBX in The Cloud or utilising a public Cloud solution and offers practical guidance on how the benefits of Cloud deployment can be realised without risking voice quality.

    Speaker

    Photo Speaker Name Profile
    Harry Bowlby Harry Bowlby View Profile
  • Simple, Intelligent IT Add to Schedule Imran Idrees  |   Cisco Meraki   |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 13:40 to 14:10

    Simple, Intelligent IT

    Functionally networks transport data from A to B but there’s a lot that can be learned by understanding the journey of all those little packets. For over a decade Cisco Meraki has allowed customers to discover underlying trends about their networks with simple, out-of-the-box historical analytics from the intuitive Meraki dashboard. Join us as we discuss how we’re building on this experience to now also provide IT and network admins tools to pre-emptively identify faults or bottlenecks as well as advice on corrective action, all with the classic Meraki simplicity.

    Speaker

    Photo Speaker Name Profile
    Imran Idrees Imran Idrees View Profile
  • UEM – A Tolkien Analysis Add to Schedule Sean Herbert  |   baramundi software AG   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 13:40 to 14:10

    UEM – A Tolkien Analysis

    A unique look at how Unified Endpoint Management can help you to take back control of your IT environment. Walk with baramundi down the rocky road to Mordor and discover why one ring may have been an issue, but one tool can still rule them all in this Lord of the Rings inspired presentation!

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • How Nutanix Enterprise Cloud Brings Developers and IT Together Add to Schedule Jose Gomez  |   Nutanix   |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 13:40 to 14:10

    How Nutanix Enterprise Cloud Brings Developers and IT Together

    In this seminar, we’d like to share our perspective on bringing developers and IT closer – fostering better collaboration and increasing application agility – to produce dramatically better outcomes for the organization.

    Speaker

    Photo Speaker Name Profile
    Jose Gomez Jose Gomez View Profile
  • The Real T&C’s – Transformation and Culture Add to Schedule Paul Fletcher  |   Sainsbury's Supermarkets Ltd.  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 13:40 to 14:10

    The Real T&C’s – Transformation and Culture

    People, processes and technology: the three key pillars of a successful any transformation.

    While technology underpins an organisation’s ability to drive any transformation, it is important to examine your technology deployment alongside the people piece of the puzzle. Understanding what you are trying to achieve with your initiatives, forming teams around this focus, and then implementing new technology enables a cultural shift that allows any transformation to thrive. Whether it is scrutinising your application stack, evaluating collaboration tools, or assessing how and where to deploy mobile devices, it is important to gain an authentic understanding of your needs and implement strategies to successfully socialise technological change.

    Speaker

    Photo Speaker Name Profile
    Paul Fletcher Paul Fletcher View Profile
  • The future works with actionable insights Add to Schedule Jugraj Singh  |   Citrix Systems UK Ltd   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 13:40 to 14:10

    The future works with actionable insights

    The sources of data in organisations today are multiplying at an exponential rate with the proliferation of users, devices, content, apps, and networks. Organisations have more rich data available to them than ever before, but data is only as good as the insights it provides and the actions you can take on it. Gathering this data can be unwieldy and making sense of it can be overwhelming. This session will demonstrate how Citrix Analytics applies machine learning to data that spans network traffic, users, files, and endpoints to identify and take action on malicious user behaviour and app performance anomalies.

    Speaker

    Photo Speaker Name Profile
    Jugraj Singh Jugraj Singh View Profile
  • You and your team are the most dangerous people in your organisation: Don't become a target Add to Schedule Andy Harris  |   Osirium   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 13:40 to 14:10

    You and your team are the most dangerous people in your organisation: Don't become a target

    These days it’s hard running IT and on top of that the attacks keep getting more sophisticated…
    This presentation is about understanding human nature, not creating super-secure password policies that end up with long but easy to crack passwords - the need to get business done and making better versions of the inevitable shortcuts.
    We’ll show ways of avoiding having to have accounts on systems. We’ll examine DevOps and SecOps issues when creating programs for delegated tasks, and how to delegate them to other departments. We hope you’ll leave relaxed, inspired and ready to be your organisation’s best friend.

    Speaker

    Photo Speaker Name Profile
    Andy Harris Andy Harris View Profile
  • The True Costs of Cybercrime and the Defender’s Dilemma in a Rapidly Evolving Cybersecurity Landscape Add to Schedule Helge Husemann  |   Malwarebytes   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 13:40 to 14:10

    The True Costs of Cybercrime and the Defender’s Dilemma in a Rapidly Evolving Cybersecurity Landscape

    Organizations in the UK are experiencing the highest incidence of phishing attacks, malware and ransomware attacks, and data breaches leading to significant increase in endpoint remediation costs. Security professionals in businesses often find themselves constantly defending against a rapidly evolving and increasingly sophisticated threat landscape that exploits the outdated and inadequate endpoint protection solutions currently deployed, leading to the defender’s dilemma.

    Attend the session to learn in-depth about the rapidly evolving threat landscape in the UK; the true costs of cybercrime; and advanced cybersecurity techniques to prevent, detect and respond against these cyberthreats.

    Speaker

    Photo Speaker Name Profile
    Helge Husemann Helge Husemann View Profile
  • AI and Cyber Security: What does and does not work Add to Schedule Jamie Graves  |   ZoneFox   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 13:40 to 14:10

    AI and Cyber Security: What does and does not work

    With the rise of automation and artificial intelligence, you may be wondering how much of an impact this has on IT security. The question is, where will the future of machine learning and AI in cybersecurity take us and what are the limitations and advantages this technology offers in defending against the insider threat?

    Join us to find out more about AI and where you should be applying it right now.

    Learning outcomes:
    The current state of AI practice and research, and how this is impacting its use in cyber security
    What the current strengths and weaknesses are with existing AI approaches
    What next generation AI will deliver for us with regards to ensuring we can promptly detect and respond to security incidents

    Speaker

    Photo Speaker Name Profile
    Jamie Graves Jamie Graves View Profile
  • Four keys to tackle software vulnerabilities in commercial and in-house software Add to Schedule Alejandro Lavie  |   Flexera  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 13:40 to 14:10

    Four keys to tackle software vulnerabilities in commercial and in-house software

    The world shifted to a paradigm that accepts that breaches will inevitably happen and they need to be detected and responded to in a more efficient fashion. However, the need and cost-effectiveness of prevention is still a reality that organizations have not been able to master, and application vulnerabilities remain at the top of security professionals concerns.

    With more than 50 new vulnerabilities disclosed every day in commercial software, it’s hard to stay focused and be effective. When you add vulnerabilities being introduced in the code being written in-house, the task just becomes unfeasible. Join us for this talk about how visibility, curation, prioritization and automation kick in for security, operations and engineering to work together towards a more secure software supply chain.

    Speaker

    Photo Speaker Name Profile
    Alejandro Lavie Alejandro Lavie View Profile
  • Splunk for AIOps: Reduce IT outages through prediction with machine learning ACCESS PLUS Add to Schedule James Hodge  |   Splunk, Inc.   |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 13:40 to 14:10

    Splunk for AIOps: Reduce IT outages through prediction with machine learning

    Splunk’s machine learning framework mixed with Splunk’s Event Management capabilities gives operations teams the opportunity to proactively act and automate on an event before it becomes an IT outage. This session will detail and demonstrate how to predict a health score of your business service, proactively take action based on those predictions and publish to your collaborative messaging and automation solutions.

    Speaker

    Speaker Name Profile
    James Hodge View Profile
  • How Third-Generation Visual Analytics Are Revolutionising Business ACCESS PLUS Add to Schedule Simon Kirby   |   Qlik  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Wed 3rd Oct 13:40 to 14:10

    How Third-Generation Visual Analytics Are Revolutionising Business

    Reporting, Business Intelligence and Analytics have come a long way since the creation of PCs. Qlik's Director of Financial Services Industry Solutions, Simon Kirby, looks closely at the third wave of Visual Analytics and how it's aligning with AI and Machine Learning to transform businesses and deliver significant customer value.

    Speaker

    Photo Speaker Name Profile
    Simon Kirby Simon Kirby View Profile
  • The energy consumption of digital infrastructures ACCESS PLUS Add to Schedule Dr Umaima Haider  |   Enterprise Computing Research Lab, University of East London  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Wed 3rd Oct 13:40 to 14:10

    The energy consumption of digital infrastructures

    Many technologies are evolving to solve internet scale problems such as decentralisation. Blockchain is one such technology with various applications in cryptocurrencies, Ledgers, etc. However, little attention is being paid to the environmental impact of such technologies. This talk will highlight the impact of such technologies on the overall energy consumption of ICT worldwide, and will discuss some of the opportunities.

    Speaker

    Photo Speaker Name Profile
    Dr Umaima Haider Dr Umaima Haider View Profile
  • Wed 3rd Oct 14:00 - 14:50
  • XSS Everywhere!: What is it, why should I care, and how can I avoid it? Add to Schedule Nick Blundell  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 14:00 to 14:50

    XSS Everywhere!: What is it, why should I care, and how can I avoid it?

    Cross-Site Scripting (XSS) is by far the most widespread high impact vulnerability present even in the best of web applications, regardless of the framework or programming language employed - a burly steadfast member of the OWASP Top Ten. The client-side nature of typical XSS has led to a general underappreciation of its exploitation potential, though a good understanding of the vulnerability and its subtle variations will show how it can be used to devastating effect... and more importantly: how it can be avoided.

    In this seminar we will build up piece-by-piece an understanding of XSS that spares no detail whilst being accessible also at a non-technical level.

    Speaker

    Photo Speaker Name Profile
    Nick Blundell Nick Blundell View Profile
  • Wed 3rd Oct 14:20 - 14:50
  • A day in the life of the UK’s biggest digital transformation Add to Schedule Mayank Prakash  |   Department for Work and Pensions (DWP)  |   Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 14:20 to 14:50

    A day in the life of the UK’s biggest digital transformation

    At DWP Digital we’re reimagining outcomes for over 22 million citizens; the scale and social purpose of this challenge is what sets us apart.

    In this session, find out more about the critical ingredients required to drive digital transformation at pace; from embedding a digital mind set to empowering multi-disciplinary teams, whilst continuing to invest in an innovation eco-system. We also look at the challenges that huge scale transformation can bring.

    Speaker

    Photo Speaker Name Profile
    Mayank Prakash Mayank Prakash View Profile
  • Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense Add to Schedule Dave Palmer  |   Darktrace   |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 14:20 to 14:50

    Leveraging AI for Dynamic & Surgical Autonomous Response for Cyber Defense

    Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, increasing confidence that a problem is emerging before automatically stopping the threat without interrupting normal business and employee activities.

    Speaker

    Photo Speaker Name Profile
    Dave Palmer Dave Palmer View Profile
  • Moving to a Business-Driven Network Model Add to Schedule Simon Pamplin  |   Silver Peak   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 14:20 to 14:50

    Moving to a Business-Driven Network Model

    Go Beyond the ‘Software-Defined Network’and move to a‘Self Driving Network’. Tell the network what the business wants, then use automation and machine learning to just make it work!

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • An Introduction To Hyper-Converged Infrastructure Add to Schedule Tony Stimson  |   Pivot3   |   Modern Storage

    Modern Storage Theatre

    Wed 3rd Oct 14:20 to 14:50

    An Introduction To Hyper-Converged Infrastructure

    This session provides an introduction to Hyper-Converged Infrastructure in simple terms. It covers modern day datacentre challenges and how innovators evolve using hyper-converged infrastructure to meet business demands. Attendees will gain an understanding of use case workloads and how Hyper-converged technology delivers performance, agility and resiliency. The session will also cover specific features and how these translate to tangible business benefits using real-life case studies.

    Speaker

    Photo Speaker Name Profile
    Tony Stimson Tony Stimson View Profile
  • ACTIV – A revolutionary way to manage Windows-as-a-Service Add to Schedule Chris Porter  |   Rimo3  |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 14:20 to 14:50

    ACTIV – A revolutionary way to manage Windows-as-a-Service

    Can you afford not to test your critical apps before deploying a Windows 10 update?

    There’s now a Security Update once a month and a Feature Update twice a year.

    This poses a massive risk to application compatibility for large organisations. 

    Rimo3’s ACTIV software platform allows you to fully automate the testing of all your applications, before deploying to any end-users.  Timescales will reduce by over 90% and costs will reduce dramatically. CIO’s gain confidence that their business is protected.

    Rimo3 ACTIV is the first and only fully automated Windows 10 update platform in the market, and it’s available now!

    Speaker

    Photo Speaker Name Profile
    Chris Porter Chris Porter View Profile
  • Content and Collaboration: the journey to moving your data to the Cloud Add to Schedule George Christophi  |   Citrix Systems UK Ltd   |   UC & Collaboration

    UC & Collaboration Theatre

    Wed 3rd Oct 14:20 to 14:50

    Content and Collaboration: the journey to moving your data to the Cloud

    Businesses all need to collaborate on data to be productive in their roles, with a mix of fragmented sources, leaving IT to deal with enabling the users and modernising their existing infrastructure. How can IT start their journey to modernise, migrate but yet keep the user experience as seamless as possible to minimise change and disruption to critical business processes? In this session we will discuss how Citrix’s workspace and tools can empower companies on their modernisation journey, and empower their users with what they need to be secure and productive in their jobs.

    Speaker

    Photo Speaker Name Profile
    George Christophi George Christophi View Profile
  • How to embrace continual change in your IT infrastructure. Add to Schedule Neil Trevains  |   Cisco   |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 14:20 to 14:50

    How to embrace continual change in your IT infrastructure.

    The days of ‘big-bang’ changes in IT infrastructure are over. Operating in the digital world means you must embrace what McKinsey has dubbed ‘Perpetual Evolution’ with an approach that supports continual changes in your business processes and IT. Find out how to baseline your organisation’s current state, monitor the dynamic changes taking place, and assess their success with a platform that constantly learns, adapts and protects. From analytics, cloud-based management and containers, to microsegmentation and the zero-trust model, Cisco’s resident Solutions Architect Neil Trevains will give you insights from A to Z in Data Centre engineering for a multicloud world.

    Speaker

    Photo Speaker Name Profile
    Neil Trevains Neil Trevains View Profile
  • Is your Network ready for IoT? Add to Schedule Horst Fellner  |   Spirent Communications   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 14:20 to 14:50

    Is your Network ready for IoT?

    IoT devices can vary significantly in behaviour and requirements. This has to be taken into consideration by modern (mobile) networks. 4G/LTE introduced features related to IoT: reduced bandwidth, extended timer to reduce battery usage and increase lifetime, optimization for signalling and user plane. 5G will follow this way and add new features like network slicing, whereas IoT devices with the same requirements can use their own virtual network. However, even the simplest IoT device can challenge the network, when deployed at scale. What happens if thousands of devices want to communicate at the same time? Will the signalling storm impact the network? Is the network able to recover? Is the dedicated 5G slice able to provide and guarantee required IoT parameters during mass deployment? This session will demonstrate how to validate mobile networks and ensure that they are ready from day one and that there are no unsolicited surprises during IoT mass deployment.

    Speaker

    Photo Speaker Name Profile
    Horst Fellner Horst Fellner View Profile
  • Analytics through the DevOps lifecycle Add to Schedule Endre Peterfi  |   Splunk, Inc.   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 14:20 to 14:50

    Analytics through the DevOps lifecycle

    One of the often-cited barriers to DevOps success is visibility across the organization and the plethora of tools. DevOps should break down the department silos. But many tools show their data in a single-tool view, maintaining the silo. Splunk, as a data and analytics platform, provides visibility by collectingand presenting the data from many tools across the DevOps Lifecycle, from planning to dev/test to deploy and monitoring in production. Agile development teams can measure velocity across sprints and releases, finding healthy projects as well as those with hygiene issues, adding to tech debt. With Splunk, you can have end-to-end visibility enabling better collaboration and true data -driven decisions.

    Speaker

    Speaker Name Profile
    Endre Peterfi View Profile
  • The Time is Ripe for Data Driven Proactive Security Add to Schedule Lucy Caiger  |   Panaseer  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 14:20 to 14:50

    The Time is Ripe for Data Driven Proactive Security

    Cyber Security is hard.  Security leaders must do their best with limited resources and time with a growing number of security products and devices in the face of ever-changing threats while an adversary only needs to get lucky once. Each layer generating data but can often still leave the fundamental question of "how secure are we and what are my biggest risks?"  Discover how leveraging your security, IT and business data you can evolve from a time consuming and costly reactive security approach to a proactive risk-based preparation and protection approach delivering a more secure organisation.

    Speaker

    Photo Speaker Name Profile
    Lucy Caiger Lucy Caiger View Profile
  • Gospel: The blockchain platform for enterprise data Add to Schedule Ian Smith  |   Gospel Technology  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 14:20 to 14:50

    Speaker

    Speaker Name Profile
    Ian Smith View Profile
  • Let’s Build a Wall: A Human Firewall Add to Schedule Hiwot Mendahun  |   Mimecast   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 14:20 to 14:50

    Let’s Build a Wall: A Human Firewall

    Many organisations tend to focus solely on using security solutions to protect their organisation from cyberattacks and fail. Since technology-based security systems can’t provide perfect protection end users play a critical part in an organisations’ security and risk posture.

    Mimecast looks at how organisations can detect, respond and recover from cyber threats keeping in mind the role of the end user. Learn tactics for how to make the end user a layer of additional security versus a security weakness.  Don’t let human error be your organisation’s weakest link.

    Speaker

    Speaker Name Profile
    Hiwot Mendahun View Profile
  • Anatomy of a Remote Access Trojan (RAT) attack Add to Schedule Fraser Howard   |   Sophos   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 14:20 to 14:50

    Anatomy of a Remote Access Trojan (RAT) attack

    In this presentation Fraser Howard will describe a rather curious malware incident that SophosLabs encountered. The presentation will include details from technical analysis of the threat in order to understand the capabilities and tricks used by the cybercriminals (and why). It will also explore how this specific incident maps to the broader threat landscape and what lessons we can learn to ultimately improve protection.

    Speaker

    Photo Speaker Name Profile
    Fraser Howard Fraser Howard View Profile
  • The current state of cyber security is a 24x7x365 game Add to Schedule Dan Pitman  |   Alert Logic   |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 14:20 to 14:50

    The current state of cyber security is a 24x7x365 game

    The lack of awareness around cyber threats and the risk that these pose to an organisation is a worrying state of affairs. Data breaches, hacks and various cyber attacks dominate the headlines on a regular basis. Unfortunately protecting an organisation against a cyber threat becomes impossible if you don’t know that the threat exists. So how do you protect your organisations against known and unknown threats? Security is constantly changing. To stay ahead of threats you need to leverage software plus services to augment your security team and capabilities.
    Join Dan Pitman, Senior Solutions Architect, as he shares insights from Alert Logic’s 2018 Cyber Security Report, based upon findings from verified security incidents from thousands of companies around world.

    Speaker

    Photo Speaker Name Profile
    Dan Pitman Dan Pitman View Profile
  • How AI is driving financial inclusion around the world ACCESS PLUS Add to Schedule Areiel Wolanow   |   Finserv Experts  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 14:20 to 14:50

    How AI is driving financial inclusion around the world

    In both developing and mature economies, successful small businesses are the single biggest vector of job growth. As a result, figuring out ways to grant the smallest business access to growth capital often has disproportionately large benefits to the economy as a whole. This talk will illustrate how AI is transforming financial inclusion around the globe. Using an evidence-based approach, we will focus on delivered results, critical success factors, and emerging patterns of solution design.

    Speaker

    Photo Speaker Name Profile
    Areiel Wolanow Areiel Wolanow View Profile
  • Where is the value in IoT? ACCESS PLUS Add to Schedule Richard Bennett  |   VMware  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Wed 3rd Oct 14:20 to 14:50

    Where is the value in IoT?

    The biggest creation of data up until now has been human beings. However increasingly complex systems of applications, end points and sensors have already begun to dwarf that. In the next few years we will see an exponential rise in IoT and edge computing which will make managing human data management seem simple in comparison.
     
    As we begin to gather a multiplicity of data sources, interpreting the context of what the edge provides, CIO’s are looking at a set of new challenges for the information they create. During this session Richard Bennett will describe a series of IoT use cases in play today and discuss the possibilities ahead.

    Speaker

    Photo Speaker Name Profile
    Richard Bennett Richard Bennett View Profile
  • How to decide if the blockchain is the right strategy for your business? ACCESS PLUS Add to Schedule Peter Chadha  |   DPI Innovative Technologies  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Wed 3rd Oct 14:20 to 14:50

    How to decide if the blockchain is the right strategy for your business?

    From 2017 cryptocurrencies and the blockchain technology that powers them exploded onto every executive’s radar. But above and beyond this hype, this session will explore how the underlying blockchain technology offers amazing new paradigms on how we work and transact with one another, making commerce cheaper, timely, frictionless and independent of linchpin intermediaries (like banks). This session will examine what the blockchain is from a commercial point of view, practical uses of it, as well as provide top tips for you to assess if the blockchain is right for your business in 2019 and beyond.

    Speaker

    Photo Speaker Name Profile
    Peter Chadha Peter Chadha View Profile
  • Wed 3rd Oct 15:00 - 15:30
  • Collaborate or Die Add to Schedule
    Scott Campbell  |   Deloitte Ventures  |   Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 15:00 to 15:30

    Collaborate or Die

    How to change working in a world that politically, economically and geographically poses barriers to collaboration. Breaking this trend is the key to growing economies, businesses and happiness. True collaboration can cure diseases, build transformational infrastructure and break artistic boundaries. Technology won’t save us; collaboration will.

    Speaker

    Photo Speaker Name Profile
    Scott Campbell Scott Campbell View Profile
  • We take security seriously Add to Schedule Javvad Malik   |   AlienVault  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 15:00 to 15:30

    We take security seriously

    "We take security seriously" four words that are so easy to say, but what does it mean in the real world?
    Are they just soothing words designed to pacify frustrated users in the aftermath of a breach? Or can these words mean something more?
    I spent months speaking to CISOs, security professionals and practitioners, as well as going undercover to speak to business owners which certainly rattled some cages.
    Thankfully, I dodged many bullets, all in the name of attempting to quantify the unquantifiable - what does it really mean to take security seriously?
    So, come along, find out what the professionals think, what the general landscape is, what steps businesses can take, and maybe a few hard-to-believe side stories.

    Speaker

    Photo Speaker Name Profile
    Javvad Malik Javvad Malik View Profile
  • Citrix Cloud & Public Cloud Design Considerations Add to Schedule Dave Brear  |   Citrix Systems UK Ltd   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 15:00 to 15:30

    Citrix Cloud & Public Cloud Design Considerations

    Most enterprise customers have a “Cloud First” agenda, the reality of which translates into a Hybrid strategy encompassing traditional data centres alongside multiple Public Cloud locations.

    During this session, you will learn about best practices about hosting EUC workloads in public cloud locations such as Azure and AWS. Key architectural principles and design strategies will be highlighted which draw on the experience gained by Citrix Consulting whilst helping with our largest enterprise customers to migrate end user computing (EUC) workloads to public cloud using the Citrix Cloud Virtual Apps and Desktops Service to deliver a secure digital workspace.

    Speaker

    Photo Speaker Name Profile
    Dave Brear Dave Brear View Profile
  • Brought to you by Acronis Add to Schedule

    Modern Storage Theatre

    Wed 3rd Oct 15:00 to 15:30

  • How to Achieve and Sustain the Ultimate Desktop and Application User Experience Add to Schedule Richard Edwards   |   Lakeside Software   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 15:00 to 15:30

    How to Achieve and Sustain the Ultimate Desktop and Application User Experience

    What quality of user experience is your PC or virtual desktop delivering to your users? Can you measure real time how much their productivity is being impacted and quickly identify the root cause? What is best practice when planning and executing a desktop transformation project? Are you struggling to drive down the cost of delivering desktop services?

    Join this session to learn best practice for achieving and managing the ultimate user experience at the lowest TCO. Find out how Lakeside SysTrack enables PC and Citrix experts achieve all this and more.

    Speaker

    Speaker Name Profile
    Richard Edwards View Profile
  • Unifying Communications with Microsoft Teams Add to Schedule Jeff Schertz   |   Polycom  |   UC & Collaboration

    UC & Collaboration Theatre

    Wed 3rd Oct 15:00 to 15:30

    Unifying Communications with Microsoft Teams

    Learn the latest details on Microsoft's cloud-based intelligent communications platform.  One year after the initial announcement of Microsoft Teams as a successor to Skype for Business Online a variety of communications devices and service offerings are now available.  These solutions help bridge the gap between traditional standards-based devices and the new Microsoft Teams meeting workflow.

    Speaker

    Photo Speaker Name Profile
    Jeff Schertz Jeff Schertz View Profile
  • The good, the bad and the ugly Add to Schedule Peter Jones   |   Avanite   |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 15:00 to 15:30

    The good, the bad and the ugly

    Join Peter Jones, CTO at Avanite Ltd who has established himself as a lead Citrix consultant working with large system integrators.

    Peter will share with you his version of 'The Good, the Bad and the Ugly' in the context where the primary area of concern is providing control over browser generated data and improving the user experience.

    Speaker

    Photo Speaker Name Profile
    Peter Jones Peter Jones View Profile
  • DevOps and Monitoring in Hybrid Environments Add to Schedule Matt Haberle  |   LogicMonitor   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 15:00 to 15:30

    DevOps and Monitoring in Hybrid Environments

    As cloud adoption rises with many benefits, it also introduces new challenges such as increased infrastructure complexity, rapid pace of change, and knowledge/skills staffing issues. Explore how to overcome these challenges with DevOps, automation, infrastructure-as-code, and end-to-end monitoring.

    Speaker

    Photo Speaker Name Profile
    Matt Haberle Matt Haberle View Profile
  • From batch to pipelines - why Mesos and DC/OS are a solution for emerging patterns in data processing Add to Schedule Matt Jarvis  |   Mesosphere Inc  |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 15:00 to 15:30

    From batch to pipelines - why Mesos and DC/OS are a solution for emerging patterns in data processing

    Data processing paradigms are undergoing a paradigm shift as we move more and more towards real time processing. Emerging software models such as the SMACK stack are at the forefront of this change, focused on a pipeline processing model, but are also introducing new levels of operational complexity in running multiple complex distributed systems such as Spark, Kafka and Cassandra. In this talk, I'll introduce both Apache Mesos and DC/OS as a solution to this growing problem, and describe the benefits are of running these new kinds of systems for emerging cloud native workloads.

    Speaker

    Photo Speaker Name Profile
    Matt Jarvis Matt Jarvis View Profile
  • How Kubernetes and Serverless are killing DevOps Add to Schedule Stephen Bourke  |   Oracle   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 15:00 to 15:30

    How Kubernetes and Serverless are killing DevOps

    Oracle will take you on a guided climb up the modern application development stack. You will start at base-camp: the operating system, then proceed via containers and container orchestration to finally summit at serverless computing. With a panoramic view from the top of the stack you will learn how these emerging technologies can streamline your operations and engineering, saving you money and letting your developers focus on your business instead of managing infrastructure. Along the way you will encounter such specimens as Oracle Linux, Docker, Kubernetes and serverless Functions-as-a-Service platforms such as the Fn Project. Finally, before descending to base-camp for a nice cup of tea, you will discover how native species such as the DevOps will have to adapt or die in this new habitat.

    Speaker

    Photo Speaker Name Profile
    Stephen Bourke Stephen Bourke View Profile
  • Brought to you by Nuix Add to Schedule Nick Pollard  |   Nuix  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 15:00 to 15:30

    Speaker

    Speaker Name Profile
    Nick Pollard View Profile
  • How to Tackle the GDPR – A Typical Privacy and Security Roadmap Add to Schedule Ian Evans  |   OneTrust   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 15:00 to 15:30

    How to Tackle the GDPR – A Typical Privacy and Security Roadmap

    With a new era of privacy regulations upon us, security and compliance professionals must make GDPR a top priority. It is essential to build a roadmap with both privacy and security in mind. In this session, we’ll discuss the importance of privacy management within the context of your existing security and compliance ecosystem –– how it fits into the larger puzzle, why it has been precariously overlooked in the past, and how it can be seamlessly integrated as a function among the information security, information technology, risk management, audit and compliance, as well as legal areas in your organization. We’ll address the importance of demonstrating on-going compliance with privacy regulations like GDPR, and how privacy management software can support security and GRC teams.

    Speaker

    Photo Speaker Name Profile
    Ian Evans Ian Evans View Profile
  • Thingbot Apocalypse: How to prepare for IoT attacks Add to Schedule David Warburton  |   F5 Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 15:00 to 15:30

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Cyber Attack Trends from the Threatscape Add to Schedule Joe Nelson  |   eSentire  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 15:00 to 15:30

    Cyber Attack Trends from the Threatscape

    What are the latest trends in the cyber criminal underworld? Which attacks are you likely to be preventing as we move further into 2018? Who’s looking for vulnerability on your network? These questions and more, answered by eSentire’s Principal Solutions Architect, Joe Nelson.

    Speaker

    Speaker Name Profile
    Joe Nelson View Profile
  • Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t) Add to Schedule Brian Shorland  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 15:00 to 15:30

    Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t)

    Long dismissed as mere network plumbing, DNS has emerged to combat adversaries using it to bypass security defenses like firewalls, IDSs, and endpoint agents. In this session BlueCat’s Brian Shorland, will break down two cyberattacks and illustrate how DNS was used despite often being understated in the report of an attack. Shorland shows how DNS can be used to provide visibility and control to secure sensitive data and critical systems, both to defend against unwanted or unauthorized access and detect abnormal or malicious behavior. Shorland also covers how to implement policy control before internal DNS caching, and DNS query monitoring for breach detection and forensic visibility.

    Speaker

    Photo Speaker Name Profile
    Brian Shorland Brian Shorland View Profile
  • The Convergence of Data Science and Software Development ACCESS PLUS Add to Schedule Margriet Groenendijk  |   IBM Watson  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Wed 3rd Oct 15:00 to 15:30

    The Convergence of Data Science and Software Development

    In order to move past the hype and achieve the full potential of machine learning, data scientists and software developers need to work more closely together towards their common goal of delivering well-architected, data-driven applications. Every industry is in the process of being transformed by software and data. It is in the collaboration between data scientists and software developers where the real value can be found by creating integrated data workflows that benefit from the unique knowledge and skill sets of each discipline.

    Speaker

    Photo Speaker Name Profile
    Margriet Groenendijk Margriet Groenendijk View Profile
  • Only the right kind of AI can untether Agile ACCESS PLUS Add to Schedule Mike Silvey  |   Moogsoft  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 15:00 to 15:30

    Only the right kind of AI can untether Agile

    AI is the future of the autonomous resource optimized future, where people will no longer need to work.

    AI mythology is immense. AI will solve world hunger, bring on world peace, predict any future, drive my car/plane/boat. AI answers every question.

    Well, it might be, but not without the right kind of AI working with the right kind of data.

    Moogsoft’s Mike Silvey will discuss how the key to delivering on the promises of AI can only be met by understanding: the outcomes to be resolved, the reality of AI’s capabilities and, what data is needed to drive desired states.

    Speaker

    Photo Speaker Name Profile
    Mike Silvey Mike Silvey View Profile
  • The Internet of Things: Web 3.0 ACCESS PLUS Add to Schedule Dai Davis  |   Percy Crow Davis & Co  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Wed 3rd Oct 15:00 to 15:30

    The Internet of Things: Web 3.0

    An ultra-cheap means of knowing about objects has the potential of revolutionising businesses in much the same way as the original internet has allowed us to know everything about individuals.  This talk explores what every IT professional needs to know – and the reality is far beyond the “trivial” examples such as the Samsung connected fridge, the Google car or tracking pallets in warehouses.  Soon almost all everyday objects will be capable of being connected.  Soon individual’s clothing, luggage, handbags, wallets and other accoutrements will be “connected”. 

    Dai will use his legal expertise and IT security skills to suggest strategies of keeping one step ahead of your competitors. 

    Speaker

    Photo Speaker Name Profile
    Dai Davis Dai Davis View Profile
  • Crowdsourcing Security Risk Assessment Add to Schedule Laurie Mercer  |   HackerOne  |   Cyber Hack

    Cyber Hack Theatre

    Wed 3rd Oct 15:00 to 15:50

    Crowdsourcing Security Risk Assessment

    Cybercriminals have never been so notorious. As technology innovation seems to outpace security defenses, organizations, including the U.S. Department of Defense, are turning to ethical-hackers to assess risk and see where they are most vulnerable. Can these external hackers be trusted? Hear from leading experts about the misconceptions of working with hackers, what vulnerabilities are most common and how these programs can be used to manage and assess risk.

    Speaker

    Photo Speaker Name Profile
    Laurie Mercer Laurie Mercer View Profile
  • Wed 3rd Oct 15:40 - 16:10
  • Unleashing the Potential of Cloud Object Storage for File Storage Add to Schedule Andres Rodriguez  |   Nasuni   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 15:40 to 16:10

    Unleashing the Potential of Cloud Object Storage for File Storage

    What do Azure, AWS, Dell EMC, Hitachi, and IBM clouds have in common? All are leveraging the UniFS® global file system from Nasuni to make their object storage ready for file storage. Learn how the combination eliminates the need for traditional NAS, file server, backup, archive, and DR infrastructure. How you can now scale file storage without the limits of legacy device-based file systems. And how you can get easier to manage and more resilient NAS that costs up to 70% less.

    Speaker

    Photo Speaker Name Profile
    Andres Rodriguez Andres Rodriguez View Profile
  • Office 365 Protection: Debunking the Myths Add to Schedule Scott Butler  |   arcserve  |   Modern Storage

    Modern Storage Theatre

    Wed 3rd Oct 15:40 to 16:10

    Office 365 Protection: Debunking the Myths

    The adoption rate of Office 365 has increased several fold in the last few years. According to a report, 1 out of every 5 corporate employees uses the O365 suite today. A lot of people are still confused about what protection Microsoft really does offer for your Exchange Online and SharePoint content?

    If you’re considering making the move or increasing O365 adoption, you’ll want peace of mind your data is comprehensively protected and accessible for your desired retention period.

    Join this breakout to find out what you still need to address in relation to O365 backup, recovery and archiving capabilities.

    Speaker

    Photo Speaker Name Profile
    Scott Butler Scott Butler View Profile
  • Accelerated Virtualised Apps and Cloud Management Enablement of Thin and Zero Clients Add to Schedule Kevin Greenway  |   10ZiG Technology   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Wed 3rd Oct 15:40 to 16:10

  • Agile communication in a human way. How Slack is shaping the future of work Add to Schedule Stuart Templeton   |   Slack   |   UC & Collaboration

    UC & Collaboration Theatre

    Wed 3rd Oct 15:40 to 16:10

  • How to Leverage AI in WiFi Networks Add to Schedule Jeff Aaron  |   Mist  |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 15:40 to 16:10

    How to Leverage AI in WiFi Networks

    AI is enabling us to solve statistically complex wireless mobile problems that we couldn’t solve just five years ago. In addition, it makes the promise of self-healing wireless networks finally attainable. The speaker explores how AI is changing WiFi, as well as new approaches to setting, monitoring and enforcing service levels, correlating events for rapid trouble-shooting, dynamically capturing packets and achieving highly accurate indoor location services.

    Speaker

    Photo Speaker Name Profile
    Jeff Aaron Jeff Aaron View Profile
  • Cloud & Data Theft: Understanding and Preventing Exfiltration of Data via DNS Add to Schedule Nick Fennell  |   EfficientIP  |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 15:40 to 16:10

    Cloud & Data Theft: Understanding and Preventing Exfiltration of Data via DNS

    Cloud computing has brought new and unprecedented levels of agility to IT infrastructures, with both public and private cloud adoption trends accelerating to support the constant needs of businesses. However, this shift has also created new targets of attack for hackers. A popular entry point is through the DNS, which is not well-protected under traditional security solutions. Enterprises cannot rely solely on cloud vendors, firewall providers or even luck to defend themselves and their data against threats. Attend this session to learn best architecture practices for a more secure cloud DNS.

    Speaker

    Photo Speaker Name Profile
    Nick Fennell Nick Fennell View Profile
  • The New Full Stack: Infra, AI, Serverless and UX (DEMO) Add to Schedule Gabriel Nepomuceno  |   Microsoft  |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 15:40 to 16:10

    The New Full Stack: Infra, AI, Serverless and UX (DEMO)

    There is a new world for a full stack developer. Now you do not only need to know how to do backend API but also how to set up the infrastructure and plan for scalability at the same time of working with. In this talk, you will understand how to deal with this new world, get the tools to be more productive and learn some tricks on the way, becoming a "Serverless, AI, Bot, UX, Buzzword" developer.
     

    Speaker

    Photo Speaker Name Profile
    Gabriel Nepomuceno Gabriel Nepomuceno View Profile
  • How to Attract and Retain DevOps Talent Add to Schedule Adam Rawat  |   Cititec  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Wed 3rd Oct 15:40 to 16:10

    Speaker

    Photo Speaker Name Profile
    Adam Rawat Adam Rawat View Profile
  • IS YOUR SOC SOARING OR SNORING? Add to Schedule Chris Harazinski  |   Splunk, Inc.   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Wed 3rd Oct 15:40 to 16:10

    IS YOUR SOC SOARING OR SNORING?

    How many security alerts can your operations team process daily? Not enough? Many organizations are in the same boat; looking for ways to mature their security operations, and increase the efficiency of skilled security analysts. However, teams that utilize Security Orchestration, Automation & Response (SOAR) platforms are seeing improvements in scale, consistency, and are responding to alerts at machine speed. 

    Speaker

    Speaker Name Profile
    Chris Harazinski View Profile
  • PAM to the Rescue: 3 Common Security Scenarios Add to Schedule Grant Burst   |   WALLIX  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Wed 3rd Oct 15:40 to 16:10

    PAM to the Rescue: 3 Common Security Scenarios

    During this seminar, we will present 3 common scenarios accros all sectors of activity, where IT security is at risk. Using a demo and real use cases, the objective is to demonstrate how Privileged Access Management (PAM) can help you save the day.

    Speaker

    Photo Speaker Name Profile
    Grant Burst Grant Burst View Profile
  • Getting best value out of your proxy investments with ultra-secure browsing Add to Schedule Henry Harrison  |   Garrison Technology   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 15:40 to 16:10

    Getting best value out of your proxy investments with ultra-secure browsing

    Once upon a time, the job of the proxy as a security tool was clear: identify bad sites and bad content, and block it. With increasingly sophisticated and targeted attacks, this job is getting harder and harder. It is time for the job of the proxy (or the proxy service) to change. From identifying and blocking known bad sites, it must transitions to keeping endpoints protected by identifying and blocking potentially risky sites.

    But in some cases these risky sites provide valid content and services, and employees have a legitimate need to go there. Rather than simply unblocking them - after all, they still remain risky - the need is for an ultra-secure browsing solution that employees can use to visit even the riskiest sites without putting the endpoint at risk. Learn how Garrison SAVI® ultra-secure browsing can help you give your proxy or proxy service a new lease of life as a platform for risk-based policy enforcement.

    Speaker

    Photo Speaker Name Profile
    Henry Harrison Henry Harrison View Profile
  • Defeat Digital Impersonation & Fake Traffic At Scale Add to Schedule Tech Leaders  |  Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 15:40 to 16:10

    Defeat Digital Impersonation & Fake Traffic At Scale

    The world’s largest digital businesses trust Shape Security to improve user experience and reduce fraud by identifying the new generation of attacks targeting legitimate web and mobile applications functionality. Today, attackers cleverly impersonate users through malware, botnets, and widely available toolkits, and are able to easily bypass most security measures.

    Join us as we share how Shape defeats these advanced attacks.

    Speakers

    Photo Speaker Name Profile
    Chris Fuller Chris Fuller View Profile
    Sean Bennett Sean Bennett View Profile
  • Your Move To The Cloud Secured Add to Schedule Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Wed 3rd Oct 15:40 to 16:10

    Your Move To The Cloud Secured

    We’ll cover the security challenges organizations are facing in their move to the cloud, ways to address these obstacles, and how the future of cloud security is changing as new technologies like containers are deployed in enterprise cloud environments.

    Speakers

    Photo Speaker Name Profile
    Richard Jones Richard Jones View Profile
    Simon Crocker Simon Crocker View Profile
  • Top 5 Lessons Learned in Deploying AI in the Real World ACCESS PLUS Add to Schedule Joshua Robinson  |   Pure Storage   |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Wed 3rd Oct 15:40 to 16:10

    Top 5 Lessons Learned in Deploying AI in the Real World

    At Pure Storage, we have helped deploy number AI systems, including one of the world’s fastest supercomputers dedicated to AI and many of the world’s most recognized brands in autonomous cars.
    During our session, Joshua Robinson, a Data Scientist at Pure Storage will be sharing what we learned in working with these customers.

    Speaker

    Photo Speaker Name Profile
    Joshua Robinson Joshua Robinson View Profile
  • PANEL: IP EXPO HOT TOPIC: AI Add to Schedule Panel  |  Keynote Theatre

    Keynote Theatre

    Wed 3rd Oct 15:40 to 16:30

    PANEL: IP EXPO HOT TOPIC: AI

    No longer purely in the realms of science fiction the use of AI has exploded in the past few years, already being used to improve healthcare, enable self-driving cars, and stop security breaches. Undoubtedly the hottest topic in IT right now, AI is redefining how we live, interact and do business – it is set to have a profound impact on our everyday lives.

    Most companies already use AI to some degree, for example it is now commonplace as part of a spam filter. However it is accepted wisdom that in the future AI will become a core part of every company’s technology strategy. Learn what is already possible with AI directly from the companies using or developing this technology and discover what will be possible in the near future.

    Speakers

    Photo Speaker Name Profile
    Charlotte Jee Charlotte Jee View Profile
    Daniel Yin Daniel Yin View Profile
    Dr Beth Singler Dr Beth Singler View Profile
    Dr Greg Benson Dr Greg Benson View Profile
    John Shaw John Shaw View Profile
  • PANEL: Cyber Security - The Year Ahead Add to Schedule Panel  |  Cyber Security Keynote

    Cyber Security Keynote Theatre

    Wed 3rd Oct 15:40 to 16:30

    Speakers

    Photo Speaker Name Profile
    Doug Howard Doug Howard View Profile
    Gary S. Miliefsky Gary S. Miliefsky View Profile
    Richard Kirk Richard Kirk View Profile
  • Wed 3rd Oct 16:20 - 16:50
  • The Distributed Enterprise Add to Schedule Michael Rapley  |   Mediatron Ltd   |   Intelligent Networks

    Intelligent Networks Theatre

    Wed 3rd Oct 16:20 to 16:50

    The Distributed Enterprise

    Understanding Remote Server Management in Small and Medium Size Businesses

    Speaker

    Speaker Name Profile
    Michael Rapley View Profile
  • The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era Add to Schedule Mark Bayne   |   Cato Networks   |   Cloud Architecture

    Cloud Architecture Theatre

    Wed 3rd Oct 16:20 to 16:50

    The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era

    SD-WAN is a new and exciting opportunity to transform enterprises costly and rigid MPLS-based wide area networks (WAN). It promises to make the WAN more affordable and agile, boost capacity, and improve resiliency. But, SD-WAN goes far beyond replacing MPLS. It can optimize global connectivity, streamline network security, and seamlessly integrate cloud resources and mobile users into  simple coherent network.

    Speaker

    Photo Speaker Name Profile
    Mark Bayne Mark Bayne View Profile
  • Beyond the Screen – How AI enables more human interactions with your customers and employees leading to a differentiated experience with your brand Add to Schedule Ian Wallis  |   Oracle   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Wed 3rd Oct 16:20 to 16:50

  • Docker within the Enterprise: Best Practices Add to Schedule Bryan Dollery  |   Docker  |   Full Stack Developer

    Full Stack Developer Theatre

    Wed 3rd Oct 16:20 to 16:50

    Speaker

    Speaker Name Profile
    Bryan Dollery View Profile
  • From liability to asset: the role DNS should be playing in your security architecture and operations Add to Schedule Steven Tee  |   Infoblox  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Wed 3rd Oct 16:20 to 16:50

    From liability to asset: the role DNS should be playing in your security architecture and operations

    DNS is a ubiquitous network service which has a front row seat when it comes to malware activities. Most organizations neglect to consider the scale and simplicity of using DNS as a visibility and control point. DNS servers are also home to a wealth of essential operational data that can accelerate incident investigation.

    This session will discuss the role that DNS could and should play in security architecture and operations as well as identify how DNS itself is increasingly used as an attack vector by malicious actors.

    Speaker

    Photo Speaker Name Profile
    Steven Tee Steven Tee View Profile
  • Protection from Internet Crime & Advanced Threats Add to Schedule Dr. Serge Droz  |   Open Systems   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Wed 3rd Oct 16:20 to 16:50

    Protection from Internet Crime & Advanced Threats

    Digital business and cybersecurity risks have become inseparable. Enterprises need to think beyond compromise in order to understand the affects. In this presentation, hear from Open System’s VP of OS-Cert as he takes a deep dive into the internet underground and how to protect your Enterprise against the real internet threats from internet crime and advanced threats.

    Speaker

    Photo Speaker Name Profile
    Dr. Serge Droz Dr. Serge Droz View Profile
  • Thu 4th Oct 10:00 - 10:40
  • How to Fix the Future Add to Schedule Andrew Keen  |     |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 10:00 to 10:40

    How to Fix the Future

    Promising to enrich democracy and level the playing field, the digital revolution has actually compounded inequality, created a surveillance style economy, fostered a long term unemployment crisis and poisoned our culture. So how to fix the future? Focusing on regulation, innovation, consumer power, citizen engagement and education, Andrew Keen lays out a five pronged strategy to realize the positive promise of the digital revolution. Real world examples taken from Estonia, Singapore, Silicon Valley, India, Germany

    Register now see Andrew Keen live at IP EXPO Europe.

    Register now

    Speaker

    Photo Speaker Name Profile
    Andrew Keen Andrew Keen View Profile
  • Thu 4th Oct 11:00 - 11:30
  • Seeing Through Human Eyes: The Power and Perils of AI Add to Schedule Carla Echevarria  |   Google  |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 11:00 to 11:30

    Seeing Through Human Eyes: The Power and Perils of AI

    In the age of intelligent machines, the most significant threat comes not from malicious machines, but from their human creators. How might we design AI systems that do not inherit human error and bias? We will discuss the process of developing machine learning systems – data gathering, model training, output generation, and human programming – and the principles of design that we must apply to these processes, in order to create AI systems that are truly beneficial for people.

    Speaker

    Photo Speaker Name Profile
    Carla Echevarria Carla Echevarria View Profile
  • Lessons I learnt about Cybersecurity from my Dad Add to Schedule Brian Honan   |     |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:00 to 11:30

    Lessons I learnt about Cybersecurity from my Dad

    At its heart many of the issues we face with cybersecurity relate to how users interact with the systems they use. Following a conversation with my father about how unsafe cars were when he was a young boy and how car safety has evolved over the subsequent decades, this talk will use that evolution of car safety to highlight how cybersecurity should evolve.

    Speaker

    Photo Speaker Name Profile
    Brian Honan Brian Honan View Profile
  • A connected city is a safe city Add to Schedule Len Padilla  |   NTT Communications   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 11:00 to 11:30

    A connected city is a safe city

    Smart cities are more than a trend—they're the wave of the future because the world is becoming more urban, with 60% of the population expected to live in cities by 2050. This trend comes with new social and economic challenges. Balancing citizen expectations with shrinking budgets is a primary concern and a common theme.
    In this presentation we take a look at how technology can aid in the interoperability of public services to better serve and protect the people.

    Speaker

    Photo Speaker Name Profile
    Len Padilla Len Padilla View Profile
  • Never Move Data Again: Cloud Solution Combines NAS and Archive File Storage and Automatically Reduces Costs as Files Age Add to Schedule Andy Hardy  |   Nasuni   |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 11:00 to 11:30

    Never Move Data Again: Cloud Solution Combines NAS and Archive File Storage and Automatically Reduces Costs as Files Age

    What if your file servers and NAS were smart enough to know what files aren’t being accessed, and charged you less to store them? What if your NAS had infinite capacity, so you never had to migrate data to bigger boxes or tape archives? This is exactly what new cloud file services are offering. Learn how leading enterprises are using Nasuni’s multi-cloud solution with Azure and AWS public cloud object storage and Dell EMC, Hitachi, and IBM private cloud object storage to scale NAS without limits and align file storage costs with the value of their data.

    Speaker

    Photo Speaker Name Profile
    Andy Hardy Andy Hardy View Profile
  • Citrix SD-WAN – The open forum customer case study session Add to Schedule Al Taylor  |   cloudDNA   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 11:00 to 11:30

    Citrix SD-WAN – The open forum customer case study session

    If you joined our session on Wednesday then you’ll already know about all the cool ways that Citrix SD-WAN helps organisations of all sizes address the challenges of providing high performance, resilient services to branch users. But is Citrix SD-WAN really all it’s hyped up to be?

    In this session, we’ll be discussing UK based deployments in from the business case to the unexpected benefits that have literally changed people's lives. Seriously.

    Featuring representatives from cloudDNA customers, this open forum panel session will also give you the opportunity to get answers to your questions from the speakers.

    We’re really looking forward to this one!

    Speaker

    Photo Speaker Name Profile
    Al Taylor Al Taylor View Profile
  • Boost your workforce productivity - 5 benefits of Desktop-as-a-service Add to Schedule Tech Leaders  |  UC & Collaboration

    UC & Collaboration Theatre

    Thu 4th Oct 11:00 to 11:30

    Boost your workforce productivity - 5 benefits of Desktop-as-a-service

    Have you ever thought that your IT teams wouldn’t have to constantly face demands to provision, manage and support traditional desktops across company-issued laptops and other devices. Providing continuous access to business applications, data and tools is especially critical to the productivity of remote, and traveling employees, while maintaining security and minimizing exposure to data leaks or data loss.

    Join our seminar and explore how your organisation can benefit from VMware DaaS solution, what are the key benefits and how simple the move towards this could be.

    Speakers

    Photo Speaker Name Profile
    Duncan MacDonald Duncan MacDonald View Profile
    Ivo Murris Ivo Murris View Profile
  • Performance Data ≠ User Experience. A Packet (or two) will Help IT! Add to Schedule Steve Brown  |   Viavi Solutions   |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 11:00 to 11:30

    Performance Data ≠ User Experience. A Packet (or two) will Help IT!

    ‘Faster, better, cheaper’ is now the IT department mantra. Enterprises just don’t work like they did 10 years ago: Network, server, application and security team silos are worse than ever with user expectations at an all-time high.

    So why are we still trying to resolve today’s IT issues with yesterday’s processes and systems?

    Worse still, we expect better outcomes even though we’re looking at the data all wrong!

    Join us to see ‘a day in the life of a trouble ticket’ evolve into the 21st century, courtesy of intelligent networks and root-cause analysis of the right problem!

    Speaker

    Photo Speaker Name Profile
    Steve Brown Steve Brown View Profile
  • Citrix SD-WAN and Microsoft Virtual WAN simplify and optimise branch office networks deployment Add to Schedule Jeremy Ward  |   Citrix Systems UK Ltd   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 11:00 to 11:30

    Citrix SD-WAN and Microsoft Virtual WAN simplify and optimise branch office networks deployment

    Built upon our long-standing partnership with Microsoft, Citrix SD-WAN is designed to integrate with the cloud to optimize bandwidth utilization and intelligently steer traffic for the best application experience. Coupled with strong integrated security, Microsoft Azure subscribers can count on protection from the ever-increasing cyber threats.

    Leveraging Microsoft Virtual WAN, together we deliver:
    • Simplified and automated large-scale branch connectivity
    • Unified network and security policy management
    • Optimized routing using Microsoft’s global network

    Speaker

    Photo Speaker Name Profile
    Jeremy Ward Jeremy Ward View Profile
  • 4 DevOps Principles for your cross-platform database team Add to Schedule Chris Unwin  |   Redgate   |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 11:00 to 11:30

    4 DevOps Principles for your cross-platform database team

    You’re aware of the benefits of DevOps – more frequent, reliable, and secure releases to name a few. But for many, the database is often a bottleneck. When combined with teams working across multiple platforms, the ability to extend DevOps practices to the database can seem daunting.

    In this session, we discuss the Database DevOps techniques you can apply when working on both Oracle and SQL Server databases, ensuring your team delivers changes safely and quickly alongside your application code.

    We will demonstrate how you can create a cross-platform, Database DevOps enabled team by:

    Speaker

    Photo Speaker Name Profile
    Chris Unwin Chris Unwin View Profile
  • Sysadmins In The Cloud: Why The New IT Still Needs Ops Add to Schedule Dominic Wellington  |   Moogsoft  |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 11:00 to 11:30

    Sysadmins In The Cloud: Why The New IT Still Needs Ops

    With the ongoing move to ever more automated forms of IT infrastructure, the role and value of IT Operations is in question. However, there is still very much a need for Ops support; it is just defined in a different way. Far from becoming less relevant, IT is more central than ever to business success, and must be considered appropriately.

    Speaker

    Photo Speaker Name Profile
    Dominic Wellington Dominic Wellington View Profile
  • Using The Sith Mindset To Build And Hone A Jedi SIEM Add to Schedule Samantha Humphries  |   Rapid7  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 11:00 to 11:30

    Using The Sith Mindset To Build And Hone A Jedi SIEM

    Yes, we used a Star Wars reference to catch your attention, and now we’ve caught it we’re excited to show you the fully operational battle station that is InsightIDR. Today you’ll see a bunch of SIEMs, with great features including UEBA, automation, analytics, and threat intelligence. However, this is the only SIEM built in collaboration with the teams that make and use the world’s leading pentesting tool. During this session, you’ll hear how we use the attacker mindset to ensure your team have the very best technologies at their fingertips. And there will definitely be Star Wars references, because obviously.

    Speaker

    Photo Speaker Name Profile
    Samantha Humphries Samantha Humphries View Profile
  • Prevention is Better than Cure – Leveraging IAM to Eliminate Phishing Add to Schedule Tech Leaders  |  Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 11:00 to 11:30

    Speakers

    Photo Speaker Name Profile
    Derek Gordon Derek Gordon View Profile
    Mike Newman Mike Newman View Profile
  • Evolving Security Analysis: Combining Human and Cyber Threat Intelligence Add to Schedule Tech Leaders  |  Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:00 to 11:30

    Evolving Security Analysis: Combining Human and Cyber Threat Intelligence

    Deception tactics used by attackers are evolving faster than the defensive techniques of most email security systems. To combat this, Mimecast continuously harvests threat intelligence from billions of monthly emails. As an email security cloud gateway, we regularly see attackers using both new evasion techniques as well as malware that's over a decade old. Mimecast understands Threat Intelligence, but with all the technology in the world, do we need a human’s trained eye to spot the threat to your company or organisation?

    Speakers

    Speaker Name Profile
    Derek Buchanan View Profile
    Kirsty Kelly View Profile
  • Closing the Hidden Open Doors of SD-WAN Add to Schedule Patrick Grillo  |   Fortinet   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 11:00 to 11:30

    Closing the Hidden Open Doors of SD-WAN

    SD-WAN is one of the top technology stories of the year, promising the best of everything and solving problems that you didn’t knew you had.  With all of this attention on the bright and shiny bits of SD-WAN, what has slipped through the cracks is the inconvenient truth that if SD-WAN is not properly implemented the damage it can cause will be far greater than any possible benefit.This session will focus on understanding the key shortcoming of SD-WAN, how to counter it and make sure that your SD-WAN efforts deliver their full potential.

    Speaker

    Photo Speaker Name Profile
    Patrick Grillo Patrick Grillo View Profile
  • Automated Security in a Multi Cloud World Add to Schedule Tech Leaders  |  Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 11:00 to 11:30

    Automated Security in a Multi Cloud World

    Businesses are moving and building new applications in cloud environments at an ever increasing pace. Learning how to manage the security and application services of these apps wherever they live can be a challenging and time consuming task.

    We show you how automation can help you deliver application security in a multi cloud world.

    Speakers

    Photo Speaker Name Profile
    Keiron Shepherd Keiron Shepherd View Profile
    Matthew Prickett Matthew Prickett View Profile
  • AI in Retail: The Path to a Personalised Shopping Experience ACCESS PLUS Add to Schedule Oliver Gindele  |   Datatonic  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 11:00 to 11:30

    AI in Retail: The Path to a Personalised Shopping Experience

    Empowered by the ease and availability of online shopping, many consumers already expect personalised, immediate help to guide their purchases. To reach these customers and deliver the desired personalised experience, AI is going to be invaluable to retailers. Digital transformation and experiences from insights based selling have led many retailers to heavily invest in Big Data technologies in order to build and store detailed views of their customers. In this session, Oliver will share how machine learning techniques combined with rich customer data can enable retailers to better target their customers via recommendations, personalized promotions, bundled products and tailored advertisement.

    Speaker

    Photo Speaker Name Profile
    Oliver Gindele Oliver Gindele View Profile
  • Using Machine Learning for Real-Time Threat Detection Across OT & IT ACCESS PLUS Add to Schedule Andrew Tsonchev  |   Darktrace  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 11:00 to 11:30

    Using Machine Learning for Real-Time Threat Detection Across OT & IT

    In an era where OT and IT are increasingly converging, the threat to critical infrastructure is growing and the need to understand and secure complex networks has become unavoidable. Modern industrial networks are highly complex systems involving the interaction of diverse and bespoke devices – legacy products, proprietary protocols, and custom solutions often work side by side with corporate IT technologies and the new generation of Internet of Things devices. The challenge of providing full coverage of enterprise, industrial and IoT environments has never been greater, meaning innovations using machine learning and AI must be explored.

    Speaker

    Photo Speaker Name Profile
    Andrew Tsonchev Andrew Tsonchev View Profile
  • XSS Everywhere!: What is it, why should I care, and how can I avoid it? Add to Schedule Nick Blundell  |   AppCheck NG   |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 11:00 to 11:50

    XSS Everywhere!: What is it, why should I care, and how can I avoid it?

    Cross-Site Scripting (XSS) is by far the most widespread high impact vulnerability present even in the best of web applications, regardless of the framework or programming language employed - a burly steadfast member of the OWASP Top Ten. The client-side nature of typical XSS has led to a general underappreciation of its exploitation potential, though a good understanding of the vulnerability and its subtle variations will show how it can be used to devastating effect... and more importantly: how it can be avoided.

    In this seminar we will build up piece-by-piece an understanding of XSS that spares no detail whilst being accessible also at a non-technical level.

    Speaker

    Photo Speaker Name Profile
    Nick Blundell Nick Blundell View Profile
  • Thu 4th Oct 11:40 - 12:10
  • How digital is helping advance the energy transition Add to Schedule Morag Watson   |   BP  |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 11:40 to 12:10

    How digital is helping advance the energy transition

    The world is growing fast, it’s changing even faster and it’s calling for more from the energy industry every day – not just more energy, but energy that’s better and cleaner. That’s the dual challenge. Deliver around a third more energy by 2040 and lift two and half billion out of low income. Digital technology can have a major impact on solving this dual challenge and we estimate that technologies such as supercomputing, data analytics and artificial intelligence could shift how society produces and consumes energy.
     
    In this keynote, Morag Watson, Chief Digital Innovation Officer at BP, will explain how digitization is helping BP advance the energy transition by reducing emissions, improving efficiency and creating new businesses.

    Speaker

    Photo Speaker Name Profile
    Morag Watson Morag Watson View Profile
  • Zero Trust & The Flaming Sword of Justice Add to Schedule Dave Lewis  |   Duo Security  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 11:40 to 12:10

    Zero Trust & The Flaming Sword of Justice

    Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users. 

    The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached it’s denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify.

    Speaker

    Photo Speaker Name Profile
    Dave Lewis Dave Lewis View Profile
  • The Art of the Possible: Delivering Intelligent Data Management in the Digital Era Add to Schedule George Kenny  |   Veeam   |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 11:40 to 12:10

    The Art of the Possible: Delivering Intelligent Data Management in the Digital Era

    Data growth and the inevitable data sprawl that follows, presents data availability, protection, compliance and transparency challenges to the modern day Business. During this session, Veeam’s George Kenny will consider the barriers you face in achieving data availability across the breadth of applications and cloud, using a 5 staged approach to intelligent data management.

    Speaker

    Photo Speaker Name Profile
    George Kenny George Kenny View Profile
  • ACTIV – A revolutionary way to manage Windows-as-a-Service Add to Schedule Chris Porter  |   Rimo3  |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 11:40 to 12:10

    ACTIV – A revolutionary way to manage Windows-as-a-Service

    Can you afford not to test your critical apps before deploying a Windows 10 update?

    There’s now a Security Update once a month and a Feature Update twice a year.

    This poses a massive risk to application compatibility for large organisations. 

    Rimo3’s ACTIV software platform allows you to fully automate the testing of all your applications, before deploying to any end-users.  Timescales will reduce by over 90% and costs will reduce dramatically. CIO’s gain confidence that their business is protected.

    Rimo3 ACTIV is the first and only fully automated Windows 10 update platform in the market, and it’s available now!

    Speaker

    Photo Speaker Name Profile
    Chris Porter Chris Porter View Profile
  • Voice - the most important Customer contact channel for your business: How to provide the best customer experience in a mobile centric world Add to Schedule Alan Mackie  |   Gamma   |   UC & Collaboration

    UC & Collaboration Theatre

    Thu 4th Oct 11:40 to 12:10

  • Finding it hard to see what’s on your network and to spot threats? Time to get fast threat detection, highly secure access, and software-defined... Add to Schedule Jonathan Stevenson  |   Cisco   |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 11:40 to 12:10

    Finding it hard to see what’s on your network and to spot threats? Time to get fast threat detection, highly secure access, and software-defined...

    The modern network is expanding rapidly. It connects multiple branches, mobile users, the cloud, and data centres. Mobility, the Internet of Things (IoT), Bring-Your-Own-Device (BYOD) access, and cloud services are critical for business growth. Yet this complexity is making it difficult to secure a network. Many organisations may not even know where to begin when it’s time to strengthen their network defences. It’s harder to see what’s on the network, and it’s harder to spot a threat. Our Network Visibility and Segmentation solution provides you with fast threat detection, highly secure access, and software-defined segmentation.

    Speaker

    Photo Speaker Name Profile
    Jonathan Stevenson Jonathan Stevenson View Profile
  • What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough Add to Schedule Alexandra Gates  |   Aerohive Networks   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 11:40 to 12:10

    What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough

    Optimizing user mobile experience requires more than just high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like OFDMA. This session covers 802.11ac and 802.11ax, data analytics, and building robust wireless networks.

    Speaker

    Photo Speaker Name Profile
    Alexandra Gates Alexandra Gates View Profile
  • Blockchain – a Use Case deep dive and technical demos Add to Schedule Vikram Kimyani  |   Oracle   |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 11:40 to 12:10

    Speaker

    Photo Speaker Name Profile
    Vikram Kimyani Vikram Kimyani View Profile
  • APIs for DevOps Teams, Creating Open Culture Bubbles Add to Schedule Martin Percival  |   Red Hat   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 11:40 to 12:10

    APIs for DevOps Teams, Creating Open Culture Bubbles

    Getting technology choices right is less than half the battle, organisational change and technology delivery can be far more disruptive and difficult to deliver. Martin is a passionate believer in being default to open, whether that applies to code or culture.

    In his presentation Martin discusses how high performing teams are the result of the context they operate in and by setting up the right open structures and environment you will accelerate you app development and DevOps experience.

    So the big question is: Can you bring the Open Organisation to your team and create APIs with the rest of the organisation?

    Speaker

    Photo Speaker Name Profile
    Martin Percival Martin Percival View Profile
  • Security. Made Smarter: Intelligent threat detection and response Add to Schedule Jonathan Zulberg  |   LogRhythm  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 11:40 to 12:10

    Security. Made Smarter: Intelligent threat detection and response

    Your job is to protect your organisation from cyberattacks. To do so, your team must make sense of a plethora of data that is growing exponentially. Resources may be tight, you may be struggling with too many alerts, and you may not be getting the visibility you need with data spread across multiple systems.

    In these circumstances, constantly evolving threats can slip through the cracks. The pressure of missing a damaging breach could be causing you to lose sleep.

    Join LogRhythm to discover how you can reduce your organisation’s risk with a smarter end-to-end approach to cybersecurity that maximises the efficiency and effectiveness of your security operations.

    Learn how:

    • NextGen SIEM enables measurably faster threat detection and response
    • UEBA improves and deepens visibility of user behaviour
    • Automation and orchestration boost efficiency and productivity
    • Threat Lifecycle Management holds the key to effective security operations
    • Machine learning and AI add a new dimension to your security analytics 
    • Cloud analytics provides the scale and intelligence needed for rapid threat detection

    Speaker

    Speaker Name Profile
    Jonathan Zulberg View Profile
  • People and Passwords Add to Schedule Pedro Martins  |   LastPass by LogMeIn  |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 11:40 to 12:10

    Speaker

    Speaker Name Profile
    Pedro Martins View Profile
  • Don't Let BYOD Put Your Whole Network at Risk Add to Schedule Matt Boddy  |   Sophos   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 11:40 to 12:10

    Don't Let BYOD Put Your Whole Network at Risk

    We carry mobile devices with us at all times, we take them to bed, we take them to the bathroom. We’ve seen time and time again what happens if someone clicks the wrong link on a Windows machine. But what happens if you do the same on your mobile? What happens if you then later connect to the same network as that mobile device? How can we protect ourselves, our families and our colleagues? These are all questions I aim to answer during this presentation where I hack into an Android device and use that device to take down a corporate network.

    Speaker

    Photo Speaker Name Profile
    Matt Boddy Matt Boddy View Profile
  • There is no inside: Why you need to move beyond perimeter based security. Add to Schedule Andrew Crail  |   Akamai  |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 11:40 to 12:10

    There is no inside: Why you need to move beyond perimeter based security.

    A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are even relevant. The enterprise security perimeter model doesn’t fit for today’s world. Whether you call it Zero Trust, CARTA, or BeyondCorp, a secure model to access on-premise, Iaas, and SaaS apps is the right approach for the future.

    Speaker

    Photo Speaker Name Profile
    Andrew Crail Andrew Crail View Profile
  • Applying AI to your Business ACCESS PLUS Add to Schedule Alain Richardt   |   RAMM Science  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 11:40 to 12:10

    Applying AI to your Business

    Organisation can no longer ignore AI as it has now fully been recognised as the fourth Industrial Revolution. Companies must now turn their focus on devising strategies for AI adoption in order to gain competitive advantage, increase process efficiencies, enhance customer experience and ultimately improve profitability. AI solutions are individual for each company depending on variables such as process complexity, market sector and business objectives. Find out more about how AI can be applied to your business and what next steps you need to take.

    Speaker

    Photo Speaker Name Profile
    Alain Richardt Alain Richardt View Profile
  • Ten Reasons Why Your IoT Project Will Fail ACCESS PLUS Add to Schedule Yodit Stanton  |   OpenSensors  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 11:40 to 12:10

    Ten Reasons Why Your IoT Project Will Fail

    Successful IoT deployments are going to be transformational on team productivity. 

IoT will transform how teams and work groups operate by making their environments more responsive, how firms operate by allowing them to use their physical infrastructure more efficiently. Sensor networks are a means to greater self-awareness and responsiveness giving not only rooms, but buildings and cities more complex and intelligently reactive nervous systems.

    Speaker

    Photo Speaker Name Profile
    Yodit Stanton Yodit Stanton View Profile
  • Blockchain - what is it actually good for? Exploring real world roadblocks and use cases ACCESS PLUS Add to Schedule Helen Disney   |   Unblocked  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 11:40 to 12:10

    Blockchain - what is it actually good for? Exploring real world roadblocks and use cases

    Blockchain is the buzz word of the moment. Everyone wants to talk about it. Few understand what it can really do or where it can be applied successfully. This session will examine 4 real world use cases of blockchain and ask what are the technical, business and political stumbling blocks that still need to be addressed to ensure wider implementation.

    Speaker

    Photo Speaker Name Profile
    Helen Disney Helen Disney View Profile
  • Thu 4th Oct 12:00 - 12:50
  • If you liked it, you should have put security on it Add to Schedule Tech Leaders  |  Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 12:00 to 12:50

    If you liked it, you should have put security on it

    Organisations know that cyber security is a huge concern, each year they budget for and insure against cyber incidents. However, if you follow any news, we know this fails consistently. Cyber security is confusing, and that confusion will need to negativity, shame, and embarrassment; leading to a lack of effective communication. In this talk, we will identify how to effectively approach a holistic security programme, through awareness, culture, and understanding on how to approach Security by Design.

    Speakers

    Photo Speaker Name Profile
    Louise Forrest Louise Forrest View Profile
    Zoë Rose Zoë Rose View Profile
  • Thu 4th Oct 12:20 - 12:50
  • Bot or human? Applying machine learning to combating the bot epidemic Add to Schedule Laurent Gil   |   Oracle Dyn  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 12:20 to 12:50

    Bot or human? Applying machine learning to combating the bot epidemic

    Bots now make up over 50 percent of website traffic, and have become the primary source of malicious application attacks, from DDoS to sophisticated intrusions. In this session you'll learn what you need to know about bot traffic, different types of bots, and real-world applications of ML and AI to identify and defeat malicious bots.

    Speaker

    Photo Speaker Name Profile
    Laurent Gil Laurent Gil View Profile
  • Creating a Resilient Business Add to Schedule Tech Leaders  |  Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 12:20 to 12:50

    Speakers

    Photo Speaker Name Profile
    Gregg Lalle Gregg Lalle View Profile
    Sam Callaghan Sam Callaghan View Profile
  • Nutanix Files & Peer Software: File Services for the Cloud Era Add to Schedule Gary Boone   |   Nutanix   |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 12:20 to 12:50

    Nutanix Files & Peer Software: File Services for the Cloud Era

    In this session, we’d like to introduce Nutanix Files (formally AFS) - a fully integrated, core component of the Nutanix Enterprise Cloud which redefines hyperconvergence by allowing a single platform to be used for VMs, VM storage, containers, block storage and file storage. Nutanix Files is a software-defined scale-out file storage solution designed to address a wide range of use cases, precluding the need for a separate NAS appliance by providing a consolidated solution with unified management for VM and file services. Nutanix Files is further enhanced by full API-integration with Peer Software, enabling real-time replication for VDI data and Global File Sharing for Active-Active multisite deployments.

    Speaker

    Photo Speaker Name Profile
    Gary Boone Gary Boone View Profile
  • Future Smarter with NETSCOUT visibility – Migrate to the Hybrid Cloud with Confidence Add to Schedule Ray Krug  |   NETSCOUT  |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 12:20 to 12:50

    Future Smarter with NETSCOUT visibility – Migrate to the Hybrid Cloud with Confidence

    The ever increasing pace of digital transformation is making businesses ever more reliant on interconnected software applications, distributed over both private software defined data centers (SDDCs) and public cloud environments, which is substantially increasing the complexity for deploying, securing and managing these new services. This increased dependence on hybrid cloud magnifies the risk that critical business services may slow down or end up failing without complete visibility across this hybrid environment.

    Speaker

    Photo Speaker Name Profile
    Ray Krug Ray Krug View Profile
  • UEM – A Tolkien Analysis Add to Schedule Sean Herbert  |   baramundi software AG   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 12:20 to 12:50

    UEM – A Tolkien Analysis

    A unique look at how Unified Endpoint Management can help you to take back control of your IT environment. Walk with baramundi down the rocky road to Mordor and discover why one ring may have been an issue, but one tool can still rule them all in this Lord of the Rings inspired presentation!

    Speaker

    Photo Speaker Name Profile
    Sean Herbert Sean Herbert View Profile
  • Istio Microservice Security Add to Schedule Luke Bond  |   ControlPlane  |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 12:20 to 12:50

    Istio Microservice Security

    Microservice security is too hard. We must issue and rotate TLS certificates, deploy identity providers, and embed auth logic in applications. These all require secure development, test, and maintenance effort. Istio (a Google, IBM, and Lyft project) offers a new way: by providing a service mesh and a unified identity for each request, it offers all these things with zero application changes.

    Speaker

    Photo Speaker Name Profile
    Luke Bond Luke Bond View Profile
  • Modernizing Legacy Applications with Habitat Add to Schedule Tom Robinson-Gore  |   Chef   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 12:20 to 12:50

    Modernizing Legacy Applications with Habitat

    Habitat is Automation that travels with the application. Learn how Habitat enables application teams to build, deploy and manage any application in any environments, helping to move existing, business critical apps to modern platforms, and deliver on a cloud-native strategy.

    Speaker

    Photo Speaker Name Profile
    Tom Robinson-Gore Tom Robinson-Gore View Profile
  • Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop Add to Schedule Jamie Sarakinis  |   Securonix   |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 12:20 to 12:50

    Next-Gen Approach to Security Monitoring with Machine Learning on Hadoop

    We live in a digital world where the volume, variety, and velocity of data continue to grow exponentially. Collecting and analyzing this data for actionable threats is an enormous challenge. Legacy SIEM tools designed 10+ years ago are not architected to scale to handle this massive volume of data, and the rule-based approach used by these SIEMS is not sufficient to detect advanced modern cyber threats.

    Join Securonix to learn about the next-gen approach to security monitoring. The Hadoop platform enables unlimited scale, and machine learning-based analytics enables you to find the needle in the haystack of threats with minimal human intervention.

    Speaker

    Photo Speaker Name Profile
    Jamie Sarakinis Jamie Sarakinis View Profile
  • Workspace Evolution Add to Schedule Tech Leaders  |  Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 12:20 to 12:50

    Workspace Evolution

    The time to migrate is now! Let us show you how easy it is to integrate on-premises Citrix infrastructures, including Legacy 6.5, with the new Citrix Workspace Platform.

    Speakers

    Photo Speaker Name Profile
    Craig Bramley Craig Bramley View Profile
    Wendy Gay Wendy Gay View Profile
  • Thingbot Apocalypse: How to prepare for IoT attacks Add to Schedule David Warburton  |   F5 Labs  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 12:20 to 12:50

    Thingbot Apocalypse: How to prepare for IoT attacks

    It is projected that by 2035 there will be over 1 trillion Things connected to the internet. That’s 142 devices for every human on this planet. Despite cutting edge technology and exciting new use cases in fields such as medical care, smart homes and autonomous vehicles, these devices are routinely hacked. Since compromised IoT devices can be used to pivot inwards and attack an organisation’s internal network or, conversely, used to create a botnet to attack many organisations at once, IoT security affects all of us, whether we use personally use IoT or not.

    Research by F5 Labs has shown that IoT attacks have been lurking in the shadows for longer than you might think and used to carry out far more than just crude denial of service attacks. Threat campaigns using IoT devices include data theft, fraud and cryptojacking. This talk will show you what devices are vulnerable, how IoT devices are found and then compromised, the trends in IoT based attacks, and how to plan for and defend against the rise of the Thingbots!

    Speaker

    Photo Speaker Name Profile
    David Warburton David Warburton View Profile
  • Don't let BYOD put your whole network at risk Add to Schedule Matt Boddy  |   Sophos   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 12:20 to 12:50

    Don't let BYOD put your whole network at risk

    We carry mobile devices with us at all times, we take them to bed, we take them to the bathroom. We’ve seen time and time again what happens if someone clicks the wrong link on a Windows machine. But what happens if you do the same on your mobile? What happens if you then later connect to the same network as that mobile device? How can we protect ourselves, our families and our colleagues? These are all questions I aim to answer during this presentation where I hack into an Android device and use that device to take down a corporate network.

    Speaker

    Photo Speaker Name Profile
    Matt Boddy Matt Boddy View Profile
  • Stepping into the cloud with confidence Add to Schedule Paul D’Cruz  |   Cisco Systems  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 12:20 to 12:50

    Stepping into the cloud with confidence

    It’s no surprise that organizations are increasingly investing in the cloud for its key capabilities—ease of use, scalability, and cost savings. The cloud is changing the way we work. This also introduces new security risks. You can roll the dice and hope that someone else is keeping an eye on security. Or, you can ensure your security in the cloud with Cisco Stepping into the cloud with confidence solutions. In this session, you will see how things are changing, what the new risks are, and how you can protect yourself and your company as you take advantage of the many benefits of using the cloud.

    Speaker

    Photo Speaker Name Profile
    Paul D’Cruz Paul D’Cruz View Profile
  • Enabling AI in the Enterprise: Looking Beyond the Algorithms ACCESS PLUS Add to Schedule Afraz Jaffri  |   Capgemini  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 12:20 to 12:50

    Enabling AI in the Enterprise: Looking Beyond the Algorithms

    When an organisation takes the first steps in AI, much of the attention is focused on finding the right people, platform, tools, frameworks and skills to build out a data science team. Not so much attention is paid to the other parts of the organisation, where AI will actually be deployed. This talk will give some insight on how to setup an enterprise to make the most of AI, from test-and-learn prototypes to delivering substantial business value.

    Speaker

    Photo Speaker Name Profile
    Afraz Jaffri Afraz Jaffri View Profile
  • Smart Buildings and GDPR ACCESS PLUS Add to Schedule Sarb Sembhi  |   Virtually Informed  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 12:20 to 12:50

    Smart Buildings and GDPR

    This session will bring together several topics related to Smart Buildings, IoT, Supply chain and GDPR. Anyone responsible for Smart Buildings will have to comply with Data Protection, and not only will they need to comply, but they will need to be able to demonstrate that they comply. Demonstrating compliance with Data Protection in Smart Buildings is a complex process, as it requires compliance in not only selecting vendors who understand security and Data Protection, but also installers, integrators and consultants who also understand their role in compliance. This session will cover the regulatory obligations as well as identify some of the key roles and responsibilities related to Data Protection in Smart Buildings.

    Speaker

    Photo Speaker Name Profile
    Sarb Sembhi Sarb Sembhi View Profile
  • Do I own my land? Myths and opportunities for blockchain in land administration ACCESS PLUS Add to Schedule Dave Stow  |   Ordnance Survey  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 12:20 to 12:50

    Do I own my land? Myths and opportunities for blockchain in land administration

    Understanding the ownership of land and property is fundamental to a nation’s economy. However in many parts of the world, ownership is unclear and the processes of registration and conveyance are slow and suffer desperately from corruption. Blockchain has been vaunted as the magic bullet to these problems, but is it? What are the realities, challenges and opportunities of administering land using blockchain? How should we go about moving to using blockchain in a way that adds value?

    Speaker

    Photo Speaker Name Profile
    Dave Stow Dave Stow View Profile
  • Secure End-Point Management in a Software defined world! Add to Schedule Doug Brown  |   IGEL Technology   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 12:20 to 13:05

    Secure End-Point Management in a Software defined world!

    In this session, IGEL’s Douglas Brown will discuss the state of end-user computing and how a software-defined approach to end-point management positions IT for the future, plus much more.
    In this session, you will learn:
    - VDI / SBC in the Enterprise Today
    - VDI is today, DaaS is tomorrow. Solutions like AWS, Azure, Google are effecting the requirement and rules of the end-point.
    - What Software-Defined means to EUC, End-points and End-point management.
    - IGELs solutions to help solve the changing world (UD Pocket, IGEL OS, ICG, and UMS).
    - The Future of IGEL and how that maps to the future of the Enterprise.

    This will be a very lively session, come one and come all to learn, have a few laughs, and walk away with one foot in to the future of EUC and IT!

    Speaker

    Photo Speaker Name Profile
    Doug Brown Doug Brown View Profile
  • PANEL: Privacy vs Security - the good, the bad & the ugly Add to Schedule Panel  |  Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 12:20 to 13:10

    PANEL: Privacy vs Security - the good, the bad & the ugly

    Privacy has been in the spotlight in recent years with revelation about how much access both government agencies and more recently social networks have to personal data. However in a catch-22 situation both privacy at the expense of security and security at the expense of privacy seem to be equally unpalletable. So how does one strike a balance between two sides so far at odds with each other and find a middle ground acceptable to all parties?

    Speakers

    Photo Speaker Name Profile
    Brian Honan Brian Honan View Profile
    Dave Lewis Dave Lewis View Profile
    Kuan Hon Kuan Hon View Profile
    Lisa Forte Lisa Forte View Profile
    Paul Ducklin Paul Ducklin View Profile
  • Thu 4th Oct 13:00 - 13:30
  • Customer Journey to Cloud Recovery with AWS and Sungard AS Add to Schedule Phil Laslett  |   Sungard AS   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 13:00 to 13:30

    Customer Journey to Cloud Recovery with AWS and Sungard AS

    Whether already using public or private cloud for your business applications or relying on-premises solutions, back-up and an effective recovery is vital to ensuring ‘business as usual’ operation if disaster does strike.
    There are many options available when it comes to recovery, but one of the most effective can be a cloud based solution - regardless of whether your business is already in the cloud or not.

    This session will evidence why a strong Disaster Recovery strategy is critical more than ever today, customer with examples of businesses that have made the decision to embrace cloud recovery.

    We’ll look at how they came about their decision, the benefits it has brought them, and lessons learn for improving resiliency in your organisation whatever stage you are in your Cloud Journey.

    We’ll also look at the AWS Cloud Platform and how Sungard AS can offer Managed, SLA backed seamless recovery both on-premise to AWS or for businesses already in AWS or other cloud environments.

    Speaker

    Photo Speaker Name Profile
    Phil Laslett Phil Laslett View Profile
  • Infrastructure Lifecycle Management – Supporting and protecting your hardware for life through innovation Add to Schedule Tech Leaders  |  Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 13:00 to 13:30

    Infrastructure Lifecycle Management – Supporting and protecting your hardware for life through innovation

    This informative session will demonstrate how we have helped organisations with their strategic IT decisions, regardless of their position in the infrastructure lifecycle.

    Whether you require Post-Warranty and End of Service Life support, want to find out more about our proactive maintenance tool utilising the power of AI and DevOps; ParkView, or simply want to understand how we can help you transition to Managed Services and implement an on-premise, off-premise or even a hybrid cloud strategy - we will cover it all in the packed session.

    Speakers

    Photo Speaker Name Profile
    Brett Pytel Brett Pytel View Profile
    Darren Ellis Darren Ellis View Profile
  • Can your WAN keep up? Start delivering uncompromised experiences over any connection. Add to Schedule Tech Leaders  |  Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 13:00 to 13:30

    Can your WAN keep up? Start delivering uncompromised experiences over any connection.

    More users, more apps, different devices? Discover how you can reduce WAN operational complexity and deliver secure, high-performance experiences over any type of wide-area network connection with SD-WAN.

    Speakers

    Photo Speaker Name Profile
    Ben Brophy Ben Brophy View Profile
    Robert McGuckin Robert McGuckin View Profile
  • How can an ADC function in a multi cloud world? Add to Schedule Andrew Scott  |   Citrix Systems UK Ltd   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 13:00 to 13:30

    How can an ADC function in a multi cloud world?

    Many enterprise businesses have begun either sourcing applications as a SaaS or migrating applications to the cloud. While on-premises applications have historically benefitted from application delivery controllers (ADCs) such as Citrix ADC to provide increased resilience, performance, and security, once applications move to the cloud, their role becomes more uncertain. How can we address these are new challenges in a hybrid cloud architecture?

    Some of the challenges include:
    Adding automation
    Mitigating outages
    Coping with complexity

    This session will focus on how Citrix Networking delivers in a cloud-first world, using its application-level intelligence and analytics in multi-cloud environments.

    Speaker

    Photo Speaker Name Profile
    Andrew Scott Andrew Scott View Profile
  • Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t) Add to Schedule Brian Shorland  |   BlueCat Networks  |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 13:00 to 13:30

    Securing Your Data: Don’t Overlook DNS (Adversaries Aren’t)

    Long dismissed as mere network plumbing, DNS has emerged to combat adversaries using it to bypass security defenses like firewalls, IDSs, and endpoint agents. In this session BlueCat’s Brian Shorland, will break down two cyberattacks and illustrate how DNS was used despite often being understated in the report of an attack. Shorland shows how DNS can be used to provide visibility and control to secure sensitive data and critical systems, both to defend against unwanted or unauthorized access and detect abnormal or malicious behavior. Shorland also covers how to implement policy control before internal DNS caching, and DNS query monitoring for breach detection and forensic visibility.

    Speaker

    Photo Speaker Name Profile
    Brian Shorland Brian Shorland View Profile
  • Can you enable SaaS based Line of Business agility, without compromising IT security? Add to Schedule Daniel Power  |   OneLogin   |   Identity & Privileged Access Management

    Identity & Privileged Access Management Theatre

    Thu 4th Oct 13:00 to 13:30

    Can you enable SaaS based Line of Business agility, without compromising IT security?

    The objective of this session is enable IT to change managers, and employees, perception of being the department that says No, to the department that says Yes, and we will make everyone’s life easier too!
    Focussing on understanding the challenge of Shadow IT, OneLogin will be looking to how to address these challenges at an organisational and technological level.

    Speaker

    Photo Speaker Name Profile
    Daniel Power Daniel Power View Profile
  • Preparing Digital Operations for Brexit with an Outcome-Led Approach Add to Schedule Chris Brain  |   Wunder  |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 13:00 to 13:30

    Preparing Digital Operations for Brexit with an Outcome-Led Approach

    You will struggle to find an enterprise-level organisation with international operations that isn’t contingency planning for the potential impact of Brexit right now.

    When preparing for change (digital or otherwise) during times of uncertainty, the biggest questions are “where do we start” and “how do we move forward?” Wunder’s experience has proven, time and time again, that focusing on outcomes first is the answer.

    In this session, Chris Brain shows how an outcome-led approach successfully helped a large, complex organisation with international reach prepare their digital operations for the potential effects of Brexit in just a few weeks.

    Speaker

    Photo Speaker Name Profile
    Chris Brain Chris Brain View Profile
  • A new Era of Cybersecurity Attacks Add to Schedule Ross Laing  |   Bitdefender   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 13:00 to 13:30

    A new Era of Cybersecurity Attacks

    An increase in sophisticated cyber-attacks worldwide in 2017 created a turbulent market. In most cases, company’s endpoints remained the main target for attackers looking to obtain a foothold into the corporate network. Faced with an increasing wave of sophisticated and elusive attacks, companies have started to pay more attention to security risks, focusing both on operational security practices, as well on strengthening their last mile of surface attacks with investments in security technologies able to address the new risks imposed by the changing nature of attacks.

    Speaker

    Photo Speaker Name Profile
    Ross Laing Ross Laing View Profile
  • Confessions of a Hacker – Under the Hoodie Add to Schedule Samantha Humphries  |   Rapid7  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:00 to 13:30

    Confessions of a Hacker – Under the Hoodie

    In this revealing session discover the tools and techniques hackers use to defeat the expensive security safeguards used in many corporate environments today. Low tech and high tech methods will be presented in an effort to help attendees understand the true level of risk faced by their organizations and where the gaps may be in their defence perimeter.

    Speaker

    Photo Speaker Name Profile
    Samantha Humphries Samantha Humphries View Profile
  • DNS Tunneling and Exfiltration Add to Schedule Kevin Piper  |   Verisign  |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:00 to 13:30

    DNS Tunneling and Exfiltration

    Hiding in plain sight, the use of DNS, a critical component of online communication, is being leveraged by hackers for malicious activities such as stealing your data, delivering malicious payloads to your systems, and probing you network for vulnerabilities.  

    DNS tunneling and exfiltration present potent threats to data security, which can be extremely difficult to detect if your organization lacks security solutions designed to spot and mitigate them.  By understanding and implementing solutions to combat DNS tunneling and exfiltration, you can keep your organization secure.

    Speaker

    Photo Speaker Name Profile
    Kevin Piper Kevin Piper View Profile
  • GDPR – Where do we go from here? Add to Schedule Joanne Bone  |   Irwin Mitchell LLP  |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 13:00 to 13:50

    GDPR – Where do we go from here?

    It’s almost 5 months since the GDPR came into force and so where are we now?  Joanne will take a practical look at what has happened in the last 5 months and what happens next with GDPR including: where has the ICO been active so far, what issues are businesses facing, how to deal with the deluge of data processing addendums and what is the position with the next wave of privacy legislation.

    Speaker

    Photo Speaker Name Profile
    Joanne Bone Joanne Bone View Profile
  • Thu 4th Oct 13:40 - 14:10
  • Bringing Enterprise to the Blockchain - Moving from Science Experiment to Practical Business Mainstream Add to Schedule
    James Allerton-Austin  |   Oracle   |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 13:40 to 14:10

    Bringing Enterprise to the Blockchain - Moving from Science Experiment to Practical Business Mainstream

    Blockchain is one of the most popular talking points in the IT industry today, with thousands of technical proofs, use-cases and experiments being planned and delivered to show the value of this technology. For all of this, when asked about production deployments of blockchain for the real enterprises of today, most of the proponents of this value will demur when it comes to talking production. Bridging this gap between science experiment and an enterprise quality platform for the modern business requires a great deal of work, much of which is done by the growing community of vendors who are collaborating to deliver not just the technical requirement and use-case solutions for blockchain, but also the practical tools to use blockchain in a meaningful way within a business. join this session to hear about the 5 key qualities that any practically usable enterprise blockchain will need to deliver and how the collaboration of enterprise vendors is making the practical use of Blockchain a reality for organisations in 2018.

    Speaker

    Photo Speaker Name Profile
    James Allerton-Austin James Allerton-Austin View Profile
  • Real cases of social engineering: hackers, competitors and insiders Add to Schedule Lisa Forte  |   Red Goat Cyber Security LLP  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 13:40 to 14:10

    Real cases of social engineering: hackers, competitors and insiders

    Social engineering can range from a simple phishing email to a prolonged campaign to turn one of your employees into a malicious insider. Lisa will share some interesting cases she has worked on involving large organisations that have been attacked through social engineering by both malicious actors and competitors. She will detail how the process works, what to look out for when it comes to insider threats and how cyber organised crime groups are trading in fake social media profiles.

    Speaker

    Photo Speaker Name Profile
    Lisa Forte Lisa Forte View Profile
  • Secure SDN for Enterprises Add to Schedule Margarida Correia  |   Juniper Networks  |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 13:40 to 14:10

    Secure SDN for Enterprises

    Many Enterprises IT departments want to deploy Hybrid-cloud and Multi-cloud environments to become more agile and achieve increasingly demanding business outcomes.
        
    By distributing workloads across public and private/on-prem clouds and extending network connectivity to existent Data Centers, companies can benefit from the best features of cloud as well as coping with existent vast amount of applications on legacy Data Centers.
        
    However, a key problem in this type of new ecosystem is complying with required network security policies. In this presentation, we show how enterprises network security requirements can be addressed in hybrid and multi-cloud environments. We also consider deployment strategies for SDN security in brownfield scenarios.

    Speaker

    Photo Speaker Name Profile
    Margarida Correia Margarida Correia View Profile
  • How to Recover from a Ransomware Infection; LIVE! Powered by Liquid Nitrogen! Add to Schedule Adam Shillcock  |   Datto   |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 13:40 to 14:10

    How to Recover from a Ransomware Infection; LIVE! Powered by Liquid Nitrogen!

    Are you sick and tired of liquid nitrogen freezing your servers and plunging your business into downtime? Do sub-zero temperatures destroy your data, cool your customers and put a crack in your profits?! Yep, we thought so. Come along to our session and see how we recover a ransomware-infected, frozen server in a matter of seconds! It’s enough to give anyone the goosebumps! Our platform is built specifically for MSPs and we have the answers you need! Wrap up warm: this is a demo you won’t want to miss!

    Speaker

    Speaker Name Profile
    Adam Shillcock View Profile
  • App Virtualization and Mobile Workspace Add to Schedule John Moody  |   Citrix Systems UK Ltd   |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 13:40 to 14:10

    App Virtualization and Mobile Workspace

    We’ve all virtualised our apps, and made all our workspaces mobile haven’t we? Has Citrix made the humble pen and paper a thing of the past? Let’s discuss...

    Speaker

    Photo Speaker Name Profile
    John Moody John Moody View Profile
  • The Rise of Collaborative Communications Add to Schedule Sahil Rekhi   |   RingCentral   |   UC & Collaboration

    UC & Collaboration Theatre

    Thu 4th Oct 13:40 to 14:10

    The Rise of Collaborative Communications

    The speed and sheer volume of communication channels is greater than at any point in history. This evolution is helping to foster better ways of working and innovative new business models. Sahil Rekhi, Managing Director, EMEA for RingCentral offers a candid presentation that explores trends, benefits and potential pitfalls offered by the rise of collaborative communication. Backed up by insights from a new UK survey of communication and application use by UK business, the session examines collaboration from both an IT and end user perspective to help organisations gain maximum benefit.

    Speaker

    Photo Speaker Name Profile
    Sahil Rekhi Sahil Rekhi View Profile
  • Beyond the Firewall: Protecting Your DNS Add to Schedule Nick Fennell  |   EfficientIP  |   Intelligent Networks

    Intelligent Networks Theatre

    Thu 4th Oct 13:40 to 14:10

    Beyond the Firewall: Protecting Your DNS

    We live in a hyper-connected world, which suffers from an extremely dynamic threat environment. DNS is critical for users anywhere to access apps and services, and it has become a primary target as well as an assault vector for hackers. Learn why traditional security solutions don't work for DNS, how exfiltration and other DNS-based attacks are carried out, as well as best practices and new technology integrations to mitigate assaults and protect your business and data.

    Speaker

    Photo Speaker Name Profile
    Nick Fennell Nick Fennell View Profile
  • Intent-Based Application Services: Intelligence and Elasticity Across Any Cloud. Add to Schedule James Sherlow  |   Avi Networks   |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 13:40 to 14:10

    Intent-Based Application Services: Intelligence and Elasticity Across Any Cloud.

    Enterprises are adopting multi-cloud strategies as springboards to increased business agility and competitive differentiation. Elastic, highly-automated application networking services such as load balancing, application monitoring, application acceleration, auto-scaling, micro‑segmentation, and application security, are essential components to deliver this agility.

    For years, enterprises have relied on appliance-based (hardware or virtual) load balancers. Unfortunately, these legacy ADCs are very inflexible at scale and slow to respond to changes or security incidents. These problems are amplified as applications migrate to the cloud.

    In contrast, the Avi Vantage Platform not only elastically scales up and down based on real-time traffic patterns, but also offers ludicrous scale at a fraction of the cost. Learn how Avi can scale up and down quickly across any cloud.

    Speaker

    Photo Speaker Name Profile
    James Sherlow James Sherlow View Profile
  • Scaling DevOps Add to Schedule Jon Hammant  |   Accenture  |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 13:40 to 14:10

    Scaling DevOps

    The session will give details on approaches to Scaling Agile and DevOps across a large-scale organisations. We’ll run through details of the approach that has been used internally within Accenture to enable the support of a 450,000 person delivery organisation as we’ve moved to an Agile/DevOps focused company. In addition, we’ll run through the options available to create your own DevOps platform and the work that we’ve Open Sourced to help kickstart organisational journeys.

    Speaker

    Photo Speaker Name Profile
    Jon Hammant Jon Hammant View Profile
  • Threat Intelligence with ShadowSearch Add to Schedule Rose Bernard  |   Digital Shadows  |   SIEM & Security Analytics

    SIEM & Security Analytics Theatre

    Thu 4th Oct 13:40 to 14:10

    Speaker

    Speaker Name Profile
    Rose Bernard View Profile
  • How would you find out if a supplier breached your data? Add to Schedule Jeremy Hendy  |   RepKnight   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 13:40 to 14:10

    How would you find out if a supplier breached your data?

    We all use tens or hundreds of third-party suppliers to store and process our data. Whether it’s your CRM, HR software, payroll, training and pension companies, your corporate data has already left the building. And as we’ve seen with many high-profile businesses like Ticketmaster, a third-party data breach can quickly cause major reputational & financial damage to your business. But how do you look after your data when it’s outside your network?

    This presentation outlines simple steps for Data Breach Detection, ensuring you're the first to find out when your data is leaked, hacked, or sold on the Dark Web. In a post-GDPR world, Data Breach Detection could save you millions.

    Speaker

    Photo Speaker Name Profile
    Jeremy Hendy Jeremy Hendy View Profile
  • Code Re-Use Analysis: The Forgotten Component of Your Incident Response Plan Add to Schedule Ari Eitan  |   Intezer   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 13:40 to 14:10

    Code Re-Use Analysis: The Forgotten Component of Your Incident Response Plan

    In the software development world, engineers frequently use ready-made code for various tasks. On the darker side of things, malware authors follow in the same path, why write your own code when existing code is prevalent and easy to use. A phenomenon that we see time and time again and one that proves beneficial in detecting malicious intent, if understood correctly.

    In this session we will demonstrate how finding code reuse of known malware with Intezer Analyze enables you to improve malware detection and analysis.

    Speaker

    Photo Speaker Name Profile
    Ari Eitan Ari Eitan View Profile
  • Smart Cities collaboration on public services ACCESS PLUS Add to Schedule John David  |   Amnick  |   Access Plus: IoT

    Access Plus: IoT Theatre

    Thu 4th Oct 13:40 to 14:10

    Smart Cities collaboration on public services

    This session will cover how through collaboration local authorities can reduce their spend, create more effective public services, and work towards a better business architecture design. John David will use examples of this can be achieved primarily through collaboration but also ensuring citizens are central to this.

    The Challenges

    • Sharing Culture
    • Political barriers
    • Short-termism mentality

    The Opportunities

    • Innovation
    • Reduce costs
    • Technologies – Digital, IoT, 5G, AI
    • Data

    Speaker

    Photo Speaker Name Profile
    John David John David View Profile
  • Blockchain Bulls**t ACCESS PLUS Add to Schedule Tazz Gault  |   State Zero  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 13:40 to 14:10

    Blockchain Bulls**t

    Blockchain does not just mean cryptocurrency. In fact, in this presentation, we’re not interested in crypto at all.
    Armed with some really awesome case studies (and some pretty poor ones), Tazz Gault, Co-Founder of State Zero – the world’s first dedicated Blockchain Lab for startups – will hopefully help bust a myth or two from this space.
    Join to discover whether the latest buzzword, blockchain, is relevant for your business, as we call bullsh*t on much of the current views.

    Speaker

    Photo Speaker Name Profile
    Tazz Gault Tazz Gault View Profile
  • Why All Behaviours And Emotions In Your Network Today Are Important To Understand Add to Schedule Harry Tinson  |   HANDD Business Solutions   |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 13:40 to 14:10

    Why All Behaviours And Emotions In Your Network Today Are Important To Understand

    If someone is on your network you should assume they’re in it.

    In a digitally changing world, a dynamic approach to security is something to be desired. The best malware behaves like a human – humans are vulnerable and unpredictable – not predictable strings of 1’s and 0’s.

    During this session Harry will run through user cases worked on with large organisations, outlining how data security has developed from a CISO’s chore into a strategic state of mind across the whole organisation.

    Speaker

    Photo Speaker Name Profile
    Harry Tinson Harry Tinson View Profile
  • Helping your organisation become data-driven ACCESS PLUS Add to Schedule Ade Adewunmi  |   Teradata  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 13:40 to 14:10

    Helping your organisation become data-driven

    Becoming a data-driven organisation doesn’t happen overnight and yet that’s what organisational leaders are often asked to do. Working out how to responsibly extract value from your organisation’s existing data assets isn’t always a straightforward process, neither is assembling the skills, processes and infrastructure. This is especially the case when both the data and infrastructure are distributed across the organisation.
     
    In this session Ade provides leaders with a framework for working these things out. Her talk also focuses on the realities of delivering these data strategies, she covers pitfalls to watch out for as well as effective ways of making the case for investment, for example, the delivery of business cases.  The aim of this session is to help leaders tasked with guiding their organisations towards a data-driven future feel better equipped to do that.

    Speaker

    Photo Speaker Name Profile
    Ade Adewunmi Ade Adewunmi View Profile
  • Monitoring Applications, Infrastructure Cloud & Containers - why you need less metrics, more insight Add to Schedule Justyn Roberts  |   Instana   |   DevOps Culture and Transformation

    DevOps Culture and Transformation Theatre

    Thu 4th Oct 13:40 to 14:10

  • Thu 4th Oct 14:00 - 14:50
  • How safe is your Password? Next Generation Authentication and E-Signature Add to Schedule Dan McLoughlin  |   OneSpan  |   Cyber Hack

    Cyber Hack Theatre

    Thu 4th Oct 14:00 to 14:50

  • Thu 4th Oct 14:20 - 14:50
  • Local authorities – The Digital Maze (where are we?) Add to Schedule
    John David  |   Amnick  |   Keynote Theatre

    Keynote Theatre

    Thu 4th Oct 14:20 to 14:50

    Local authorities – The Digital Maze (where are we?)

    Amnick are presenting their national research exclusively at this event. This research focussed on 2 main questions shown below – with 116 UK local authorities.    

    Is your local authority developing/creating Tech solutions (e.g. Demonstrator projects/ Accelerator projects)? To support future service delivery.

    Values of the work

    • Types of solutions being worked upon
    • Are these scalable?
    • How/where is this being funded from

    Digital Transformation

    • Have you started the journey?
    • What are your current successes?
    • What technologies are working best for you

    This session will be articulating at high level of the current status amongst these 116 authorities. This is a large-scale study done primarily by contacting these authorities and questionnaires.

    Speaker

    Photo Speaker Name Profile
    John David John David View Profile
  • Harnessing the Law of Data Gravity – Cyber Defence for the Hybrid Cloud Add to Schedule Siân John  |   Microsoft  |   Cyber Security Keynote

    Cyber Security Keynote Theatre

    Thu 4th Oct 14:20 to 14:50

    Harnessing the Law of Data Gravity – Cyber Defence for the Hybrid Cloud

    Digital transformation drives business critical workloads to the cloud, it’s also driving traditional cybersecurity operations managers a little nuts. Harnessing the law of data gravity is a promising path forward for cyber defence and response. This talk will propose a new model that replaces the old school SIEM enabling SOC teams to focus on intelligent automation and security decision making where context and integration from data gravity is most abundant. This session will outline how the law of data gravity can be applied to security and demonstrate some first steps toward a new SOC / cyber defence model for 2020 and beyond

    Speaker

    Photo Speaker Name Profile
    Siân John Siân John View Profile
  • Moving to a Business-Driven Network Model Add to Schedule Simon Pamplin  |   Silver Peak   |   Cloud Architecture

    Cloud Architecture Theatre

    Thu 4th Oct 14:20 to 14:50

    Moving to a Business-Driven Network Model

    Go Beyond the ‘Software-Defined Network’and move to a‘Self Driving Network’. Tell the network what the business wants, then use automation and machine learning to just make it work!

    Speaker

    Photo Speaker Name Profile
    Simon Pamplin Simon Pamplin View Profile
  • Data Centre Networking at 100Gb/s and Higher Add to Schedule Steve Jarman  |   Spirent Communications  |   Modern Storage

    Modern Storage Theatre

    Thu 4th Oct 14:20 to 14:50

    Data Centre Networking at 100Gb/s and Higher

    The entire bandwidth of the Internet of the late 1990s can now be handled by a single data centre switch! This is a time of unprecedented change in networking. 100G Ethernet has been deployed in larger data centres for a number of years and thoughts are now turning to 400G and beyond. The proliferation of virtual servers and east-west traffic within data centres is driving new control-plane technologies such as VXLAN, eBGP and EVPN. This session will examine the networking technologies and testing of the modern data centre, looking at how lessons learned from 100G deployments can inform future strategies.

    Speaker

    Photo Speaker Name Profile
    Steve Jarman Steve Jarman View Profile
  • Creating the ultimate digital workspace end-user experience Add to Schedule Nikkie Spencer  |   Direct Line Group  |   App Virtualisation & Mobile Workspaces

    App Virtualisation & Mobile Workspaces Theatre

    Thu 4th Oct 14:20 to 14:50

    Creating the ultimate digital workspace end-user experience

    Nicola explores and talks about some of the common business challenges when addressing end user experience management & digital transformation. She’ll explain how it’s become necessary to not only measure but be able to analyse client-side performance ensuring the best possible experience for users. DLG will elaborate on how they’ve been able to resolve a number of major incidents in just hours, helping to eliminate inefficiencies whilst making the necessary service improvements to enable informed decision making for positive on-going change.

    Speaker

    Photo Speaker Name Profile
    Nikkie Spencer Nikkie Spencer View Profile
  • Microsoft Teams, The Future of Collaboration and Telephony in Office 365? Add to Schedule Tom Arbuthnot  |   Modality Systems  |   UC & Collaboration

    UC & Collaboration Theatre

    Thu 4th Oct 14:20 to 14:50

    Microsoft Teams, The Future of Collaboration and Telephony in Office 365?

    Over 125,000 enterprises already use Microsoft Teams. Available to 181 markets with global PSTN Telephony and Conferencing, Teams is a chat-centric collaboration tool that brings together all the services in Office 365 to allow business to operate more efficiently and effectively.

    Speaker

    Photo Speaker Name Profile
    Tom Arbuthnot Tom Arbuthnot View Profile
  • Cloud in the Spotlight: How a National Institution ripped up the rule book with its Cloud Transformation Add to Schedule George Tunnicliffe  |   National Theatre  |   Cloud, Networks and Mobility

    Cloud, Networks and Mobility Theatre

    Thu 4th Oct 14:20 to 14:50

    Cloud in the Spotlight: How a National Institution ripped up the rule book with its Cloud Transformation

    As part of the National Theatre’s move to the cloud, the Operations Team looked to see what else they could do differently. Talking about embracing the change, George Tunnicliffe speaks about the culture, maximising the benefits of the change and creating a new delivery model for the team. With real-world examples and some of those lessons learned, this talk is part story, part informational and all actual about doing things differently and learning along the way!

    Speaker

    Photo Speaker Name Profile
    George Tunnicliffe George Tunnicliffe View Profile
  • Morality and Ethics - Caring is Everything Add to Schedule Sam Warner  |   Black Pepper Software Ltd.  |   Full Stack Developer

    Full Stack Developer Theatre

    Thu 4th Oct 14:20 to 14:50

    Morality and Ethics - Caring is Everything

    In software development, caring is everything. Of late, we've seen a wave of unethical tech plague our industry in ways we'd never thought it could. Are we just guns-for-hire developers? How do we prevent unethical technology spreading (and being made)?

    Spoiler: Awareness and diversity are key...

    Speaker

    Photo Speaker Name Profile
    Sam Warner Sam Warner View Profile
  • ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts Add to Schedule Kevin Kiley  |   OneTrust   |   Cyber Threat Protection

    Cyber Threat Protection Theatre

    Thu 4th Oct 14:20 to 14:50

    ISO 27001 & the GDPR: Identifying Overlap and Streamlining Efforts

    Together, security and privacy teams share a common goal: Protect the organization from reputational damage, lawsuits, and regulatory trouble. On one hand, ISO 27001 focuses on the assessment of risks and protection of the organization. On the other, the GDPR aims to assess and protect the rights and freedoms of individuals. With a joint goal in mind, it is crucial that security and privacy teams work together to develop a common language that produces greater productivity and takes advantage of collective efforts. In this session, OneTrust will present findings from research conducted in cooperation with the International Association of Privacy Professionals (IAPP), sharing how ISO 27001 and the GDPR overlap, as well as how security and privacy teams can work together to become more effective.

    Speaker

    Photo Speaker Name Profile
    Kevin Kiley Kevin Kiley View Profile
  • Scoping infections and disrupting breaches with Splunk Add to Schedule Greg Wiley  |   Splunk, Inc.   |   Advanced Threat Prevention

    Advanced Threat Prevention Theatre

    Thu 4th Oct 14:20 to 14:50

    Scoping infections and disrupting breaches with Splunk

    Infection and exploits will occur. The new goal is to prevent those infections from becoming a data breach. To do this successfully, security analysts need the ability to continuously collect, analyze, correlate and investigate a diverse set of data.
    Listen to this session to hear the specific data sources and capabilities required to determine the scope of an infection before it turns into a breach. See a live incident investigation that demonstrates this approach.

    Speaker

    Speaker Name Profile
    Greg Wiley View Profile
  • Pathway to the Future of Security & SD-WAN Add to Schedule David van Schravendijk  |   Cisco Meraki   |   Cloud Security

    Cloud Security Theatre

    Thu 4th Oct 14:20 to 14:50

    Pathway to the Future of Security & SD-WAN

    SaaS applications are straining existing network infrastructure and cybersecurity threats are consistently evolving. Learn how a network can be re-architected to prepare for the upcoming digital transformation using simplicity. Security & SD-WAN can be delivered together intuitively and effectively.

    Speaker

    Photo Speaker Name Profile
    David van Schravendijk David van Schravendijk View Profile
  • AI like an Expert ACCESS PLUS Add to Schedule Jon McLoone  |   Wolfram Research  |   Access Plus: AI & Analytics

    Access Plus: AI & Analytics Theatre

    Thu 4th Oct 14:20 to 14:50

    AI like an Expert

    New machine learning techniques have burst on to the scene in recent years making some remarkable predictive models possible. However, with the newness of much of this technology, there is a limited supply of experts capable of wielding the new tools.
     
    Like any technology there will be a drive to automate and make the capabilities accessible to more people, and eventually consumers.
     
    Wolfram is leading the charge in automating AI, this talk will show some of the steps taken to make AI into just another tool for everyday data science and how anyone who has a basic knowledge of coding and an interest in the concepts of AI can already achieve significant results. Examples shown will include computer vision, audio analysis, and behaviour prediction.

    Speaker

    Photo Speaker Name Profile
    Jon McLoone Jon McLoone View Profile
  • Developing Blockchain Workforce ACCESS PLUS Add to Schedule Irene Dima  |   EC-Council  |   Access Plus: Blockchain

    Access Plus: Blockchain Theatre

    Thu 4th Oct 14:20 to 14:50

    Developing Blockchain Workforce

    While organizations are now exploring the in-depth the potential of Blockchain Technology, they also face several challenges in adopting and scaling blockchain-powered solutions across different operations. Many of these technologies have been tested in specific use cases only and considered unready for large-scale commercial implementation. In addition to that, questions now arise that the so-called unhackable blockchain technology could be threatened by the emergence of quantum computers. To address regulatory and reputational risk as well issues of  unfamiliarity, lack of knowledge, and lack of experience, organizations need to develop and retain internal blockchain talent.

    Speaker

    Photo Speaker Name Profile
    Irene Dima Irene Dima View Profile
  • Providing the best experience to users: Delivering content the cloud way Add to Schedule Jason Poole  |   Citrix Systems UK Ltd   |   Intelligent Networks